Lucene search

K
mageiaGentoo FoundationMGASA-2021-0462
HistoryOct 06, 2021 - 10:41 p.m.

Updated opendmarc packages fix security vulnerability

2021-10-0622:41:56
Gentoo Foundation
advisories.mageia.org
13

0.01 Low

EPSS

Percentile

83.5%

OpenDMARC through 1.3.2 and 1.4.x, when used with pypolicyd-spf 2.0.2, allows attacks that bypass SPF and DMARC authentication in situations where the HELO field is inconsistent with the MAIL FROM field (CVE-2019-20790). OpenDMARC through 1.3.2 and 1.4.x allows attacks that inject authentication results to provide false information about the domain that originated an e-mail message. This is caused by incorrect parsing and interpretation of SPF/DKIM authentication results, as demonstrated by the example.net(.example.com substring (CVE-2020-12272). OpenDMARC through 1.3.2 and 1.4.x through 1.4.0-Beta1 has improper null termination in the function opendmarc_xml_parse that can result in a one-byte heap overflow in opendmarc_xml when parsing a specially crafted DMARC aggregate report. This can cause remote memory corruption when a ‘\0’ byte overwrites the heap metadata of the next chunk and its PREV_INUSE flag (CVE-2020-12460).

OSVersionArchitecturePackageVersionFilename
Mageia8noarchopendmarc< 1.4.1.1-1opendmarc-1.4.1.1-1.mga8