An issue was discovered in FNET through 4.6.4. The code for processing the hostname from an LLMNR request doesn't check for '\0' termination. Therefore, the deduced length of the hostname doesn't reflect the correct length of the actual data. This may lead to Information Disclosure in _fnet_llmnr_poll in fnet_llmnr.c during a response to a malicious request of the DNS class IN.
References
Link | Resource |
---|---|
http://fnet.sourceforge.net/manual/fnet_history.html | Release Notes Third Party Advisory |
https://us-cert.cisa.gov/ics/advisories/icsa-20-343-01 | Third Party Advisory US Government Resource |
https://www.kb.cert.org/vuls/id/815128 | Third Party Advisory US Government Resource |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2020-12-11T22:36:31
Updated: 2020-12-11T22:36:31
Reserved: 2020-08-10T00:00:00
Link: CVE-2020-17467
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-12-11T23:15:13.557
Modified: 2023-10-12T18:31:10.153
Link: CVE-2020-17467
JSON object: View
Redhat Information
No data.
CWE