CVE-2020-12272

EUVD-2020-4585
OpenDMARC through 1.3.2 and 1.4.x allows attacks that inject authentication results to provide false information about the domain that originated an e-mail message. This is caused by incorrect parsing and interpretation of SPF/DKIM authentication results, as demonstrated by the example.net(.example.com substring.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5.3 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 73%
Affected Products (NVD)
VendorProductVersion
trusteddomainopendmarc
1.0.0 ≤
𝑥
≤ 1.3.2
trusteddomainopendmarc
1.4.0
trusteddomainopendmarc
1.4.0:beta0
trusteddomainopendmarc
1.4.0:beta1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
opendmarc
bookworm
1.4.2-2
fixed
bullseye
1.4.0~beta1+dfsg-6+deb11u1
fixed
sid
1.4.2-5
fixed
stretch
postponed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
opendmarc
bionic
Fixed 1.3.2-3ubuntu0.2
released
eoan
ignored
focal
Fixed 1.3.2-7ubuntu0.1
released
groovy
ignored
hirsute
ignored
impish
ignored
jammy
not-affected
kinetic
ignored
lunar
not-affected
mantic
not-affected
noble
not-affected
trusty
dne
xenial
Fixed 1.3.1+dfsg-3ubuntu0.1~esm1
released