Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-48521

Опубликовано: 11 июл. 2023
Источник: debian
EPSS Низкий

Описание

An issue was discovered in OpenDKIM through 2.10.3, and 2.11.x through 2.11.0-Beta2. It fails to keep track of ordinal numbers when removing fake Authentication-Results header fields, which allows a remote attacker to craft an e-mail message with a fake sender address such that programs that rely on Authentication-Results from OpenDKIM will treat the message as having a valid DKIM signature when in fact it has none.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
opendkimfixed2.11.0~beta2-9package
opendkimfixed2.11.0~beta2-8+deb12u1bookwormpackage
opendkimfixed2.11.0~beta2-4+deb11u1bullseyepackage

Примечания

  • https://github.com/trusteddomainproject/OpenDKIM/issues/148

EPSS

Процентиль: 34%
0.00137
Низкий

Связанные уязвимости

CVSS3: 5.3
ubuntu
больше 2 лет назад

An issue was discovered in OpenDKIM through 2.10.3, and 2.11.x through 2.11.0-Beta2. It fails to keep track of ordinal numbers when removing fake Authentication-Results header fields, which allows a remote attacker to craft an e-mail message with a fake sender address such that programs that rely on Authentication-Results from OpenDKIM will treat the message as having a valid DKIM signature when in fact it has none.

CVSS3: 5.3
nvd
больше 2 лет назад

An issue was discovered in OpenDKIM through 2.10.3, and 2.11.x through 2.11.0-Beta2. It fails to keep track of ordinal numbers when removing fake Authentication-Results header fields, which allows a remote attacker to craft an e-mail message with a fake sender address such that programs that rely on Authentication-Results from OpenDKIM will treat the message as having a valid DKIM signature when in fact it has none.

CVSS3: 5.3
github
больше 2 лет назад

An issue was discovered in OpenDKIM through 2.10.3, and 2.11.x through 2.11.0-Beta2. It fails to keep track of ordinal numbers when removing fake Authentication-Results header fields, which allows a remote attacker to craft an e-mail message with a fake sender address such that programs that rely on Authentication-Results from OpenDKIM will treat the message as having a valid DKIM signature when in fact it has none.

CVSS3: 5.3
fstec
больше 2 лет назад

Уязвимость компонента Fake Authentication Result Handler программного обеспечения DKIM-фильтра OpenDKIM, позволяющая нарушителю оказывать влияние на целостность защищаемой информации

CVSS3: 5.3
redos
больше 1 года назад

Уязвимость opendkim

EPSS

Процентиль: 34%
0.00137
Низкий