5
CVSSv2

CVE-2019-12290

Published: 22/10/2019 Updated: 07/11/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

GNU libidn2 prior to 2.2.0 fails to perform the roundtrip checks specified in RFC3490 Section 4.2 when converting A-labels to U-labels. This makes it possible in some circumstances for one domain to impersonate another. By creating a malicious domain that matches a target domain except for the inclusion of certain punycoded Unicode characters (that would be discarded when converted first to a Unicode label and then back to an ASCII label), arbitrary domains can be impersonated.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

gnu libidn2

Vendor Advisories

Several security issues were fixed in Libidn2 ...
heap-based buffer overflow in idn2_to_ascii_4i in lib/lookupc idn2_to_ascii_4i in lib/lookupc in GNU libidn2 before 211 has a heap-based buffer overflow via a long domain string(CVE-2019-18224) ...
idn2_to_ascii_4i in lib/lookupc in GNU libidn2 before 211 has a heap-based buffer overflow via a long domain string (CVE-2019-18224) GNU libidn2 before 220 fails to perform the roundtrip checks specified in RFC3490 Section 42 when converting A-labels to U-labels This makes it possible in some circumstances for one domain to impersonate anot ...