-
Notifications
You must be signed in to change notification settings - Fork 597
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
read-heap-buffer-overflow in ares_parse_soa_reply() #333
Comments
fixed by #332 |
Fix invalid read in ares_parse_soa_reply.c found during fuzzing Fixes Bug: c-ares#333 Fix By: lutianxiong (@ltx2018)
Fix invalid read in ares_parse_soa_reply.c found during fuzzing Fixes Bug: c-ares#333 Fix By: lutianxiong (@ltx2018)
FYI this flaw was assigned CVE-2020-22217. |
NVD scored it as a critical: Sorry for the mention, but I think this might be of your interest @bagder |
Unfortunately, NVD scores almost everything a critical 9.8 anymore (usually against the wishes of the developers and other members of the security. Not to say they should be ignored, but take all of their ratings with a huge dash of salt. Some more info: |
If this is, indeed, an OOB read, then NVD scored incorrectly in this case. That said, I am not defending NVD as they frequently do not score correctly. That said, I want to point out that one part of CVSS specs says to "Score for the worst". That is one thing that leads to many v2 10 / v3 9.8 scores, especially when a vendor says e.g. "Vulnerability fixed". Without details orgs are forced to score like that, which may be artificially high of course. |
we found read-heap-buffer-overflow by fuzzing c-ares master-branch
lenth unchecked before read aptr
The text was updated successfully, but these errors were encountered: