CVE-2022-48521

EUVD-2022-51217
An issue was discovered in OpenDKIM through 2.10.3, and 2.11.x through 2.11.0-Beta2. It fails to keep track of ordinal numbers when removing fake Authentication-Results header fields, which allows a remote attacker to craft an e-mail message with a fake sender address such that programs that rely on Authentication-Results from OpenDKIM will treat the message as having a valid DKIM signature when in fact it has none.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5.3 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 33%
Affected Products (NVD)
VendorProductVersion
opendkimopendkim
𝑥
≤ 2.10.3
opendkimopendkim
2.11.0:beta0
opendkimopendkim
2.11.0:beta1
opendkimopendkim
2.11.0:beta2
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
opendkim
bookworm
2.11.0~beta2-8+deb12u1
fixed
bullseye
2.11.0~beta2-4+deb11u1
fixed
sid
2.11.0~beta2-9.1
fixed
trixie
2.11.0~beta2-9.1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
opendkim
bionic
needs-triage
focal
needs-triage
jammy
needs-triage
kinetic
ignored
lunar
ignored
mantic
ignored
noble
needs-triage
trusty
ignored
xenial
needs-triage