[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

252416

 
 

909

 
 

196839

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2019-1327 --- libidn2

ID: oval:org.secpod.oval:def:1601085Date: (C)2019-12-23   (M)2023-11-10
Class: PATCHFamily: unix




idn2_to_ascii_4i in lib/lookup.c in GNU libidn2 before 2.1.1 has a heap-based buffer overflow via a long domain string. GNU libidn2 before 2.2.0 fails to perform the roundtrip checks specified in RFC3490 Section 4.2 when converting A-labels to U-labels. This makes it possible in some circumstances for one domain to impersonate another. By creating a malicious domain that matches a target domain except for the inclusion of certain punycoded Unicode characters , arbitrary domains can be impersonated.

Platform:
Amazon Linux AMI
Product:
libidn2
Reference:
ALAS-2019-1327
CVE-2019-12290
CVE-2019-18224
CVE    2
CVE-2019-12290
CVE-2019-18224

© SecPod Technologies