CVE-2020-6072

Name
CVE-2020-6072
Description
An exploitable code execution vulnerability exists in the label-parsing functionality of Videolabs libmicrodns 0.1.0. When parsing compressed labels in mDNS messages, the rr_decode function's return value is not checked, leading to a double free that could be exploited to execute arbitrary code. An attacker can send an mDNS message to trigger this vulnerability.
NVD Severity
high
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Exploit https://talosintelligence.com/vulnerability_reports/TALOS-2020-0995
DEBIAN https://www.debian.org/security/2020/dsa-4671
GENTOO https://security.gentoo.org/glsa/202005-10

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:videolabs:libmicrodns:0.1.0:*:*:*:*:*:*:* libmicrodns == None == 0.1.0

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
vlc edge-community 3.0.9.2-r0 None fixed
vlc 3.22-community 3.0.9.2-r0 None fixed
vlc 3.21-community 3.0.9.2-r0 None fixed
vlc 3.20-community 3.0.9.2-r0 None fixed
vlc 3.19-community 3.0.9.2-r0 None fixed
vlc 3.18-community 3.0.9.2-r0 None fixed
vlc 3.17-community 3.0.9.2-r0 None fixed