CVE-2022-48521

An issue was discovered in OpenDKIM through 2.10.3, and 2.11.x through 2.11.0-Beta2. It fails to keep track of ordinal numbers when removing fake Authentication-Results header fields, which allows a remote attacker to craft an e-mail message with a fake sender address such that programs that rely on Authentication-Results from OpenDKIM will treat the message as having a valid DKIM signature when in fact it has none.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.3 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 34%
VendorProductVersion
opendkimopendkim
𝑥
≤ 2.10.3
opendkimopendkim
2.11.0:beta0
opendkimopendkim
2.11.0:beta1
opendkimopendkim
2.11.0:beta2
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
opendkim
bullseye
2.11.0~beta2-4+deb11u1
fixed
bookworm
2.11.0~beta2-8+deb12u1
fixed
sid
2.11.0~beta2-9.1
fixed
trixie
2.11.0~beta2-9.1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
opendkim
noble
needs-triage
mantic
ignored
lunar
ignored
kinetic
ignored
jammy
needs-triage
focal
needs-triage
bionic
needs-triage
xenial
needs-triage
trusty
ignored