An exploitable code execution vulnerability exists in the label-parsing functionality of Videolabs libmicrodns 0.1.0. When parsing compressed labels in mDNS messages, the rr_decode function's return value is not checked, leading to a double free that could be exploited to execute arbitrary code. An attacker can send an mDNS message to trigger this vulnerability.
The product calls free() twice on the same memory address.
Link | Tags |
---|---|
https://www.debian.org/security/2020/dsa-4671 | third party advisory vendor advisory |
https://security.gentoo.org/glsa/202005-10 | third party advisory vendor advisory |
https://talosintelligence.com/vulnerability_reports/TALOS-2020-0995 | exploit third party advisory technical description |