7.5
CVSSv2

CVE-2020-12460

Published: 27/07/2020 Updated: 07/11/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

OpenDMARC up to and including 1.3.2 and 1.4.x up to and including 1.4.0-Beta1 has improper null termination in the function opendmarc_xml_parse that can result in a one-byte heap overflow in opendmarc_xml when parsing a specially crafted DMARC aggregate report. This can cause remote memory corruption when a '\0' byte overwrites the heap metadata of the next chunk and its PREV_INUSE flag.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

trusteddomain opendmarc 1.4.0

trusteddomain opendmarc

fedoraproject fedora 33

fedoraproject fedora 34

debian debian linux 9.0

Vendor Advisories

Debian Bug report logs - #966464 opendmarc: CVE-2020-12460 Package: src:opendmarc; Maintainer for src:opendmarc is Scott Kitterman <scott@kittermancom>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Tue, 28 Jul 2020 19:24:02 UTC Severity: important Tags: security, upstream Found in versions opendmarc/ ...
OpenDMARC through 132 and 14x through 140-Beta1 has improper null termination in the function opendmarc_xml_parse that can result in a one-byte heap overflow in opendmarc_xml when parsing a specially crafted DMARC aggregate report This can cause remote memory corruption when a '\0' byte overwrites the heap metadata of the next chunk and its ...