ALAS-2019-1327 --- libidn2ID: oval:org.secpod.oval:def:1601085 | Date: (C)2019-12-23 (M)2023-11-10 |
Class: PATCH | Family: unix |
idn2_to_ascii_4i in lib/lookup.c in GNU libidn2 before 2.1.1 has a heap-based buffer overflow via a long domain string. GNU libidn2 before 2.2.0 fails to perform the roundtrip checks specified in RFC3490 Section 4.2 when converting A-labels to U-labels. This makes it possible in some circumstances for one domain to impersonate another. By creating a malicious domain that matches a target domain except for the inclusion of certain punycoded Unicode characters , arbitrary domains can be impersonated.
Platform: |
Amazon Linux AMI |