OpenDMARC through 1.3.2 and 1.4.x through 1.4.0-Beta1 has improper null termination in the function opendmarc_xml_parse that can result in a one-byte heap overflow in opendmarc_xml when parsing a specially crafted DMARC aggregate report. This can cause remote memory corruption when a '\0' byte overwrites the heap metadata of the next chunk and its PREV_INUSE flag.
                
            References
                    Configurations
                    Configuration 1 (hide)
| 
 | 
Configuration 2 (hide)
| 
 | 
Configuration 3 (hide)
| 
 | 
History
                    21 Nov 2024, 04:59
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://github.com/trusteddomainproject/OpenDMARC/issues/64 - Exploit, Third Party Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2021/04/msg00026.html - Mailing List, Third Party Advisory | |
| References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2D4JGHMALEJEWWG56DKR5OZB22TK7W5B/ - | |
| References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JHDKMCZGE3W4XBP76NLI2Q7IOZHXLD4A/ - | |
| References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KBOGOQOK3TIWWJV66MW5YWNRJAFFYGR5/ - | |
| References | () https://security.gentoo.org/glsa/202011-02 - Third Party Advisory | |
| References | () https://sourceforge.net/projects/opendmarc/ - Product, Third Party Advisory | 
21 Nov 2022, 13:52
| Type | Values Removed | Values Added | 
|---|---|---|
| CPE | cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:* | |
| References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D4JGHMALEJEWWG56DKR5OZB22TK7W5B/ - Mailing List, Third Party Advisory | |
| References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KBOGOQOK3TIWWJV66MW5YWNRJAFFYGR5/ - Mailing List, Third Party Advisory | |
| References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JHDKMCZGE3W4XBP76NLI2Q7IOZHXLD4A/ - Mailing List, Third Party Advisory | |
| References | (MLIST) https://lists.debian.org/debian-lts-announce/2021/04/msg00026.html - Mailing List, Third Party Advisory | 
31 May 2021, 04:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
Information
                Published : 2020-07-27 23:15
Updated : 2024-11-21 04:59
NVD link : CVE-2020-12460
Mitre link : CVE-2020-12460
CVE.ORG link : CVE-2020-12460
JSON object : View
Products Affected
                fedoraproject
- fedora
debian
- debian_linux
trusteddomain
- opendmarc
CWE
                
                    
                        
                        CWE-787
                        
            Out-of-bounds Write
