An issue was discovered in FNET through 4.6.4. The code for processing the hostname from an LLMNR request doesn't check for '\0' termination. Therefore, the deduced length of the hostname doesn't reflect the correct length of the actual data. This may lead to Information Disclosure in _fnet_llmnr_poll in fnet_llmnr.c during a response to a malicious request of the DNS class IN.
References
Link Resource
http://fnet.sourceforge.net/manual/fnet_history.html Release Notes Third Party Advisory
https://us-cert.cisa.gov/ics/advisories/icsa-20-343-01 Third Party Advisory US Government Resource
https://www.kb.cert.org/vuls/id/815128 Third Party Advisory US Government Resource
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2020-12-11T22:36:31

Updated: 2020-12-11T22:36:31

Reserved: 2020-08-10T00:00:00


Link: CVE-2020-17467

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2020-12-11T23:15:13.557

Modified: 2023-10-12T18:31:10.153


Link: CVE-2020-17467

JSON object: View

cve-icon Redhat Information

No data.

CWE