SB2021051959 - Arch Linux update for opendmarc



SB2021051959 - Arch Linux update for opendmarc

Published: May 19, 2021

Security Bulletin ID SB2021051959
CSH Severity
Medium
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 vulnerabilities.


1) Authentication Bypass by Spoofing (CVE-ID: CVE-2019-20790)

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists in OpenDMARC when used with pypolicyd-spf 2.0.2 when processing headers added by previous SPF filters. A remote attacker can bypass SPF and DMARC authentication in situations where the HELO field is inconsistent with the MAIL FROM field.


2) Authentication Bypass by Spoofing (CVE-ID: CVE-2020-12272)

The vulnerability allows a remote non-authenticated attacker to manipulate data.

OpenDMARC through 1.3.2 and 1.4.x allows attacks that inject authentication results to provide false information about the domain that originated an e-mail message. This is caused by incorrect parsing and interpretation of SPF/DKIM authentication results, as demonstrated by the example.net(.example.com substring.


Remediation

Install update from vendor's website.