Bug 1861991 (CVE-2020-12460) - CVE-2020-12460 OpenDMARC: improper null termination in function opendmarc_xml_parse leads to heap-buffer overflow
Summary: CVE-2020-12460 OpenDMARC: improper null termination in function opendmarc_xml...
Keywords:
Status: CLOSED UPSTREAM
Alias: CVE-2020-12460
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1861992 1861993
Blocks:
TreeView+ depends on / blocked
 
Reported: 2020-07-30 05:46 UTC by Dhananjay Arunesh
Modified: 2020-07-30 07:27 UTC (History)
2 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2020-07-30 07:27:56 UTC
Embargoed:


Attachments (Terms of Use)

Description Dhananjay Arunesh 2020-07-30 05:46:36 UTC
OpenDMARC through 1.3.2 and 1.4.x through 1.4.0-Beta1 has improper null termination in the function opendmarc_xml_parse that can result in a one-byte heap overflow in opendmarc_xml when parsing a specially crafted DMARC aggregate report. This can cause remote memory corruption when a '\0' byte overwrites the heap metadata of the next chunk and its PREV_INUSE flag.

References:
https://github.com/trusteddomainproject/OpenDMARC/issues/64
https://sourceforge.net/projects/opendmarc/

Comment 1 Dhananjay Arunesh 2020-07-30 05:47:14 UTC
Created opendmarc tracking bugs for this issue:

Affects: epel-all [bug 1861993]
Affects: fedora-all [bug 1861992]

Comment 2 Product Security DevOps Team 2020-07-30 07:27:56 UTC
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.


Note You need to log in before you can comment on or make changes to this bug.