ID CVE-2020-6072
Summary An exploitable code execution vulnerability exists in the label-parsing functionality of Videolabs libmicrodns 0.1.0. When parsing compressed labels in mDNS messages, the rr_decode function's return value is not checked, leading to a double free that could be exploited to execute arbitrary code. An attacker can send an mDNS message to trigger this vulnerability.
References
Vulnerable Configurations
  • cpe:2.3:a:videolabs:libmicrodns:0.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:videolabs:libmicrodns:0.1.0:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 03-06-2022 - 18:16)
Impact:
Exploitability:
CWE CWE-415
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
debian DSA-4671
gentoo GLSA-202005-10
misc https://talosintelligence.com/vulnerability_reports/TALOS-2020-0995
Last major update 03-06-2022 - 18:16
Published 24-03-2020 - 21:15
Last modified 03-06-2022 - 18:16
Back to Top