CVE-2020-12272

OpenDMARC through 1.3.2 and 1.4.x allows attacks that inject authentication results to provide false information about the domain that originated an e-mail message. This is caused by incorrect parsing and interpretation of SPF/DKIM authentication results, as demonstrated by the example.net(.example.com substring.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.3 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 67%
VendorProductVersion
trusteddomainopendmarc
1.0.0 ≤
𝑥
≤ 1.3.2
trusteddomainopendmarc
1.4.0
trusteddomainopendmarc
1.4.0:beta0
trusteddomainopendmarc
1.4.0:beta1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
opendmarc
bullseye
1.4.0~beta1+dfsg-6+deb11u1
fixed
stretch
postponed
bookworm
1.4.2-2
fixed
sid
1.4.2-5
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
opendmarc
noble
not-affected
mantic
not-affected
lunar
not-affected
kinetic
ignored
jammy
not-affected
impish
ignored
hirsute
ignored
groovy
ignored
focal
Fixed 1.3.2-7ubuntu0.1
released
eoan
ignored
bionic
Fixed 1.3.2-3ubuntu0.2
released
xenial
Fixed 1.3.1+dfsg-3ubuntu0.1~esm1
released
trusty
dne