SB2021052225 - Fedora 34 update for opendmarc



SB2021052225 - Fedora 34 update for opendmarc

Published: May 22, 2021

Security Bulletin ID SB2021052225
Severity
High
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 33% Medium 67%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Out-of-bounds write (CVE-ID: CVE-2020-12460)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

OpenDMARC through 1.3.2 and 1.4.x through 1.4.0-Beta1 has improper null termination in the function opendmarc_xml_parse that can result in a one-byte heap overflow in opendmarc_xml when parsing a specially crafted DMARC aggregate report. This can cause remote memory corruption when a '�' byte overwrites the heap metadata of the next chunk and its PREV_INUSE flag.


2) Authentication Bypass by Spoofing (CVE-ID: CVE-2019-20790)

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists in OpenDMARC when used with pypolicyd-spf 2.0.2 when processing headers added by previous SPF filters. A remote attacker can bypass SPF and DMARC authentication in situations where the HELO field is inconsistent with the MAIL FROM field.


3) Authentication Bypass by Spoofing (CVE-ID: CVE-2020-12272)

The vulnerability allows a remote non-authenticated attacker to manipulate data.

OpenDMARC through 1.3.2 and 1.4.x allows attacks that inject authentication results to provide false information about the domain that originated an e-mail message. This is caused by incorrect parsing and interpretation of SPF/DKIM authentication results, as demonstrated by the example.net(.example.com substring.


Remediation

Install update from vendor's website.