Lucene search

K
archlinuxArchLinuxASA-202105-13
HistoryMay 19, 2021 - 12:00 a.m.

[ASA-202105-13] opendmarc: multiple issues

2021-05-1900:00:00
security.archlinux.org
166

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.006 Low

EPSS

Percentile

78.7%

Arch Linux Security Advisory ASA-202105-13

Severity: Medium
Date : 2021-05-19
CVE-ID : CVE-2019-20790 CVE-2020-12272
Package : opendmarc
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-1375

Summary

The package opendmarc before version 1.4.1.1-1 is vulnerable to
multiple issues including content spoofing and authentication bypass.

Resolution

Upgrade to 1.4.1.1-1.

pacman -Syu “opendmarc>=1.4.1.1-1”

The problems have been fixed upstream in version 1.4.1.1.

Workaround

None.

Description

  • CVE-2019-20790 (authentication bypass)

OpenDMARC before 1.4.1, when used with pypolicyd-spf 2.0.2, allows
attacks that bypass SPF and DMARC authentication in situations where
the HELO field is inconsistent with the MAIL FROM field.

  • CVE-2020-12272 (content spoofing)

OpenDMARC before 1.4.1 allows attacks that inject authentication
results to provide false information about the domain that originated
an e-mail message. This is caused by incorrect parsing and
interpretation of SPF/DKIM authentication results, as demonstrated by
the example.net(.example.com substring.

OpenDMARC has added checking to validate that the domain element in
both SPF and DKIM header fields being inspected argument contains only
valid domain name characters. This has been fixed as of OpenDMARC 1.4.1
(March 2021).

Impact

A remote attacker could spoof SPF, DMARC and DKIM authentication
results.

References

https://github.com/trusteddomainproject/OpenDMARC/blob/develop/SECURITY/CVE-2019-20970
https://bugs.launchpad.net/pypolicyd-spf/+bug/1838816
https://sourceforge.net/p/opendmarc/tickets/235/
https://www.usenix.org/system/files/sec20fall_chen-jianjun_prepub_0.pdf
https://github.com/trusteddomainproject/OpenDMARC/issues/49
https://github.com/trusteddomainproject/OpenDMARC/issues/158
https://github.com/trusteddomainproject/OpenDMARC/commit/d72e1ec0ae6ed3a9827b31be4f268fc528232371
https://github.com/trusteddomainproject/OpenDMARC/commit/9c0db8c12e4488fbf948afc27d8395d0c6bb53bd
https://github.com/trusteddomainproject/OpenDMARC/commit/5f980792546d11bc16dff7f875188ba81989ba33
https://github.com/trusteddomainproject/OpenDMARC/blob/develop/SECURITY/CVE-2020-12272
https://sourceforge.net/p/opendmarc/tickets/237/
https://github.com/trusteddomainproject/OpenDMARC/commit/f3a9a9d4edfaa05102292727d021683f58aa4b6e
https://security.archlinux.org/CVE-2019-20790
https://security.archlinux.org/CVE-2020-12272

OSVersionArchitecturePackageVersionFilename
ArchLinuxanyanyopendmarc< 1.4.1.1-1UNKNOWN

References

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.006 Low

EPSS

Percentile

78.7%