CVE-2020-12460

OpenDMARC through 1.3.2 and 1.4.x through 1.4.0-Beta1 has improper null termination in the function opendmarc_xml_parse that can result in a one-byte heap overflow in opendmarc_xml when parsing a specially crafted DMARC aggregate report. This can cause remote memory corruption when a '\0' byte overwrites the heap metadata of the next chunk and its PREV_INUSE flag.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 94%
VendorProductVersion
trusteddomainopendmarc
𝑥
≤ 1.3.2
trusteddomainopendmarc
1.4.0:beta0
trusteddomainopendmarc
1.4.0:beta1
debiandebian_linux
9.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
opendmarc
bullseye
1.4.0~beta1+dfsg-6+deb11u1
fixed
bookworm
1.4.2-2
fixed
sid
1.4.2-5
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
opendmarc
mantic
not-affected
lunar
not-affected
kinetic
not-affected
jammy
not-affected
impish
not-affected
hirsute
not-affected
groovy
ignored
focal
Fixed 1.3.2-7ubuntu0.1
released
bionic
Fixed 1.3.2-3ubuntu0.2
released
xenial
Fixed 1.3.1+dfsg-3ubuntu0.1~esm1
released
trusty
dne