ID CVE-2020-12460
Summary OpenDMARC through 1.3.2 and 1.4.x through 1.4.0-Beta1 has improper null termination in the function opendmarc_xml_parse that can result in a one-byte heap overflow in opendmarc_xml when parsing a specially crafted DMARC aggregate report. This can cause remote memory corruption when a '\0' byte overwrites the heap metadata of the next chunk and its PREV_INUSE flag.
References
Vulnerable Configurations
  • cpe:2.3:a:trusteddomain:opendmarc:1.4.0:beta1:*:*:*:*:*:*
    cpe:2.3:a:trusteddomain:opendmarc:1.4.0:beta1:*:*:*:*:*:*
  • cpe:2.3:a:trusteddomain:opendmarc:-:*:*:*:*:*:*:*
    cpe:2.3:a:trusteddomain:opendmarc:-:*:*:*:*:*:*:*
  • cpe:2.3:a:trusteddomain:opendmarc:1.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:trusteddomain:opendmarc:1.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:trusteddomain:opendmarc:1.1.0:-:*:*:*:*:*:*
    cpe:2.3:a:trusteddomain:opendmarc:1.1.0:-:*:*:*:*:*:*
  • cpe:2.3:a:trusteddomain:opendmarc:1.1.0:beta2:*:*:*:*:*:*
    cpe:2.3:a:trusteddomain:opendmarc:1.1.0:beta2:*:*:*:*:*:*
  • cpe:2.3:a:trusteddomain:opendmarc:1.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:trusteddomain:opendmarc:1.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:trusteddomain:opendmarc:1.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:trusteddomain:opendmarc:1.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:trusteddomain:opendmarc:1.1.3:*:*:*:*:*:*:*
    cpe:2.3:a:trusteddomain:opendmarc:1.1.3:*:*:*:*:*:*:*
  • cpe:2.3:a:trusteddomain:opendmarc:1.2.0:-:*:*:*:*:*:*
    cpe:2.3:a:trusteddomain:opendmarc:1.2.0:-:*:*:*:*:*:*
  • cpe:2.3:a:trusteddomain:opendmarc:1.2.0:beta0:*:*:*:*:*:*
    cpe:2.3:a:trusteddomain:opendmarc:1.2.0:beta0:*:*:*:*:*:*
  • cpe:2.3:a:trusteddomain:opendmarc:1.2.0:beta1:*:*:*:*:*:*
    cpe:2.3:a:trusteddomain:opendmarc:1.2.0:beta1:*:*:*:*:*:*
  • cpe:2.3:a:trusteddomain:opendmarc:1.2.0:beta2:*:*:*:*:*:*
    cpe:2.3:a:trusteddomain:opendmarc:1.2.0:beta2:*:*:*:*:*:*
  • cpe:2.3:a:trusteddomain:opendmarc:1.2.0:beta3:*:*:*:*:*:*
    cpe:2.3:a:trusteddomain:opendmarc:1.2.0:beta3:*:*:*:*:*:*
  • cpe:2.3:a:trusteddomain:opendmarc:1.2.1:-:*:*:*:*:*:*
    cpe:2.3:a:trusteddomain:opendmarc:1.2.1:-:*:*:*:*:*:*
  • cpe:2.3:a:trusteddomain:opendmarc:1.2.1:beta0:*:*:*:*:*:*
    cpe:2.3:a:trusteddomain:opendmarc:1.2.1:beta0:*:*:*:*:*:*
  • cpe:2.3:a:trusteddomain:opendmarc:1.2.1:beta1:*:*:*:*:*:*
    cpe:2.3:a:trusteddomain:opendmarc:1.2.1:beta1:*:*:*:*:*:*
  • cpe:2.3:a:trusteddomain:opendmarc:1.2.1:beta2:*:*:*:*:*:*
    cpe:2.3:a:trusteddomain:opendmarc:1.2.1:beta2:*:*:*:*:*:*
  • cpe:2.3:a:trusteddomain:opendmarc:1.3.0:-:*:*:*:*:*:*
    cpe:2.3:a:trusteddomain:opendmarc:1.3.0:-:*:*:*:*:*:*
  • cpe:2.3:a:trusteddomain:opendmarc:1.3.0:beta0:*:*:*:*:*:*
    cpe:2.3:a:trusteddomain:opendmarc:1.3.0:beta0:*:*:*:*:*:*
  • cpe:2.3:a:trusteddomain:opendmarc:1.3.0:beta1:*:*:*:*:*:*
    cpe:2.3:a:trusteddomain:opendmarc:1.3.0:beta1:*:*:*:*:*:*
  • cpe:2.3:a:trusteddomain:opendmarc:1.3.0:beta2:*:*:*:*:*:*
    cpe:2.3:a:trusteddomain:opendmarc:1.3.0:beta2:*:*:*:*:*:*
  • cpe:2.3:a:trusteddomain:opendmarc:1.3.0:beta3:*:*:*:*:*:*
    cpe:2.3:a:trusteddomain:opendmarc:1.3.0:beta3:*:*:*:*:*:*
  • cpe:2.3:a:trusteddomain:opendmarc:1.3.0:beta4:*:*:*:*:*:*
    cpe:2.3:a:trusteddomain:opendmarc:1.3.0:beta4:*:*:*:*:*:*
  • cpe:2.3:a:trusteddomain:opendmarc:1.3.1:-:*:*:*:*:*:*
    cpe:2.3:a:trusteddomain:opendmarc:1.3.1:-:*:*:*:*:*:*
  • cpe:2.3:a:trusteddomain:opendmarc:1.3.1:beta0:*:*:*:*:*:*
    cpe:2.3:a:trusteddomain:opendmarc:1.3.1:beta0:*:*:*:*:*:*
  • cpe:2.3:a:trusteddomain:opendmarc:1.3.1:beta1:*:*:*:*:*:*
    cpe:2.3:a:trusteddomain:opendmarc:1.3.1:beta1:*:*:*:*:*:*
  • cpe:2.3:a:trusteddomain:opendmarc:1.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:trusteddomain:opendmarc:1.3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:trusteddomain:opendmarc:1.4.0:beta0:*:*:*:*:*:*
    cpe:2.3:a:trusteddomain:opendmarc:1.4.0:beta0:*:*:*:*:*:*
  • cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
    cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
  • cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
    cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 21-11-2022 - 13:52)
Impact:
Exploitability:
CWE CWE-787
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
gentoo GLSA-202011-02
misc
Last major update 21-11-2022 - 13:52
Published 27-07-2020 - 23:15
Last modified 21-11-2022 - 13:52
Back to Top