ID CVE-2020-12460
Summary OpenDMARC through 1.3.2 and 1.4.x through 1.4.0-Beta1 has improper null termination in the function opendmarc_xml_parse that can result in a one-byte heap overflow in opendmarc_xml when parsing a specially crafted DMARC aggregate report. This can cause remote memory corruption when a '\0' byte overwrites the heap metadata of the next chunk and its PREV_INUSE flag.
References
Vulnerable Configurations
  • cpe:2.3:a:trusteddomain:opendmarc:-:*:*:*:*:*:*:*
    cpe:2.3:a:trusteddomain:opendmarc:-:*:*:*:*:*:*:*
  • cpe:2.3:a:trusteddomain:opendmarc:1.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:trusteddomain:opendmarc:1.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:trusteddomain:opendmarc:1.1.0:-:*:*:*:*:*:*
    cpe:2.3:a:trusteddomain:opendmarc:1.1.0:-:*:*:*:*:*:*
  • cpe:2.3:a:trusteddomain:opendmarc:1.1.0:beta2:*:*:*:*:*:*
    cpe:2.3:a:trusteddomain:opendmarc:1.1.0:beta2:*:*:*:*:*:*
  • cpe:2.3:a:trusteddomain:opendmarc:1.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:trusteddomain:opendmarc:1.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:trusteddomain:opendmarc:1.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:trusteddomain:opendmarc:1.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:trusteddomain:opendmarc:1.1.3:*:*:*:*:*:*:*
    cpe:2.3:a:trusteddomain:opendmarc:1.1.3:*:*:*:*:*:*:*
  • cpe:2.3:a:trusteddomain:opendmarc:1.2.0:-:*:*:*:*:*:*
    cpe:2.3:a:trusteddomain:opendmarc:1.2.0:-:*:*:*:*:*:*
  • cpe:2.3:a:trusteddomain:opendmarc:1.2.0:beta0:*:*:*:*:*:*
    cpe:2.3:a:trusteddomain:opendmarc:1.2.0:beta0:*:*:*:*:*:*
  • cpe:2.3:a:trusteddomain:opendmarc:1.2.0:beta1:*:*:*:*:*:*
    cpe:2.3:a:trusteddomain:opendmarc:1.2.0:beta1:*:*:*:*:*:*
  • cpe:2.3:a:trusteddomain:opendmarc:1.2.0:beta2:*:*:*:*:*:*
    cpe:2.3:a:trusteddomain:opendmarc:1.2.0:beta2:*:*:*:*:*:*
  • cpe:2.3:a:trusteddomain:opendmarc:1.2.0:beta3:*:*:*:*:*:*
    cpe:2.3:a:trusteddomain:opendmarc:1.2.0:beta3:*:*:*:*:*:*
  • cpe:2.3:a:trusteddomain:opendmarc:1.2.1:-:*:*:*:*:*:*
    cpe:2.3:a:trusteddomain:opendmarc:1.2.1:-:*:*:*:*:*:*
  • cpe:2.3:a:trusteddomain:opendmarc:1.2.1:beta0:*:*:*:*:*:*
    cpe:2.3:a:trusteddomain:opendmarc:1.2.1:beta0:*:*:*:*:*:*
  • cpe:2.3:a:trusteddomain:opendmarc:1.2.1:beta1:*:*:*:*:*:*
    cpe:2.3:a:trusteddomain:opendmarc:1.2.1:beta1:*:*:*:*:*:*
  • cpe:2.3:a:trusteddomain:opendmarc:1.2.1:beta2:*:*:*:*:*:*
    cpe:2.3:a:trusteddomain:opendmarc:1.2.1:beta2:*:*:*:*:*:*
  • cpe:2.3:a:trusteddomain:opendmarc:1.3.0:-:*:*:*:*:*:*
    cpe:2.3:a:trusteddomain:opendmarc:1.3.0:-:*:*:*:*:*:*
  • cpe:2.3:a:trusteddomain:opendmarc:1.3.0:beta0:*:*:*:*:*:*
    cpe:2.3:a:trusteddomain:opendmarc:1.3.0:beta0:*:*:*:*:*:*
  • cpe:2.3:a:trusteddomain:opendmarc:1.3.0:beta1:*:*:*:*:*:*
    cpe:2.3:a:trusteddomain:opendmarc:1.3.0:beta1:*:*:*:*:*:*
  • cpe:2.3:a:trusteddomain:opendmarc:1.3.0:beta2:*:*:*:*:*:*
    cpe:2.3:a:trusteddomain:opendmarc:1.3.0:beta2:*:*:*:*:*:*
  • cpe:2.3:a:trusteddomain:opendmarc:1.3.0:beta3:*:*:*:*:*:*
    cpe:2.3:a:trusteddomain:opendmarc:1.3.0:beta3:*:*:*:*:*:*
  • cpe:2.3:a:trusteddomain:opendmarc:1.3.0:beta4:*:*:*:*:*:*
    cpe:2.3:a:trusteddomain:opendmarc:1.3.0:beta4:*:*:*:*:*:*
  • cpe:2.3:a:trusteddomain:opendmarc:1.3.1:-:*:*:*:*:*:*
    cpe:2.3:a:trusteddomain:opendmarc:1.3.1:-:*:*:*:*:*:*
  • cpe:2.3:a:trusteddomain:opendmarc:1.3.1:beta0:*:*:*:*:*:*
    cpe:2.3:a:trusteddomain:opendmarc:1.3.1:beta0:*:*:*:*:*:*
  • cpe:2.3:a:trusteddomain:opendmarc:1.3.1:beta1:*:*:*:*:*:*
    cpe:2.3:a:trusteddomain:opendmarc:1.3.1:beta1:*:*:*:*:*:*
  • cpe:2.3:a:trusteddomain:opendmarc:1.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:trusteddomain:opendmarc:1.3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:trusteddomain:opendmarc:1.4.0:-:*:*:*:*:*:*
    cpe:2.3:a:trusteddomain:opendmarc:1.4.0:-:*:*:*:*:*:*
  • cpe:2.3:a:trusteddomain:opendmarc:1.4.0:beta0:*:*:*:*:*:*
    cpe:2.3:a:trusteddomain:opendmarc:1.4.0:beta0:*:*:*:*:*:*
  • cpe:2.3:a:trusteddomain:opendmarc:1.4.0:beta1:*:*:*:*:*:*
    cpe:2.3:a:trusteddomain:opendmarc:1.4.0:beta1:*:*:*:*:*:*
CVSS
Base: 7.5
Impact:
Exploitability:
CWE CWE-787
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
Last major update 28-07-2020 - 01:05
Published 27-07-2020 - 23:15
Last modified 29-07-2020 - 16:32
Back to Top