GLSA Advocate
Joined: 12 May 2004 Posts: 2663
|
Posted: Tue Nov 03, 2020 2:26 am Post subject: [ GLSA 202011-02 ] OpenDMARC |
|
|
Gentoo Linux Security Advisory
Title: OpenDMARC: Heap-based buffer overflow (GLSA 202011-02)
Severity: normal
Exploitable: local, remote
Date: 2020-11-03
Bug(s): #734158
ID: 202011-02
Synopsis
A heap-based buffer overflow in OpenDMARC might allow remote
attackers to execute arbitrary code.
Background
OpenDMARC is an open source DMARC implementation.
Affected Packages
Package: mail-filter/opendmarc
Vulnerable: < 1.3.3
Unaffected: >= 1.3.3
Architectures: All supported architectures
Description
It was found that OpenDMARC did not properly handle DMARC aggregate
reports.
Impact
A remote attacker, by sending a specially crafted DMARC aggregate
report, could possibly cause a Denial of Service condition and depending
on how OpenDMARC library is used in linked application execute arbitrary
code with the privileges of the process.
Workaround
There is no known workaround at this time.
Resolution
All OpenDMARC users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=mail-filter/opendmarc-1.3.3"
|
References
CVE-2020-12460 |
|