7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
0.001 Low
EPSS
Percentile
49.9%
When a zone file in ldns 1.7.1 is parsed, the function ldns_nsec3_salt_data
is too trusted for the length value obtained from the zone file. When the
memcpy is copied, the 0xfe - ldns_rdf_size(salt_rdf) byte data can be
copied, causing heap overflow information leakage.
github.com/NLnetLabs/ldns/commit/136ec420437041fe13f344a2053e774f9050cc38
github.com/NLnetLabs/ldns/issues/51
launchpad.net/bugs/cve/CVE-2020-19861
nvd.nist.gov/vuln/detail/CVE-2020-19861
security-tracker.debian.org/tracker/CVE-2020-19861
ubuntu.com/security/notices/USN-5257-1
ubuntu.com/security/notices/USN-5257-2
www.cve.org/CVERecord?id=CVE-2020-19861
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
0.001 Low
EPSS
Percentile
49.9%