OpenDMARC: Heap-based buffer overflow — GLSA 202011-02

A heap-based buffer overflow in OpenDMARC might allow remote attackers to execute arbitrary code.

Affected packages

mail-filter/opendmarc on all architectures
Affected versions < 1.3.3
Unaffected versions >= 1.3.3

Background

OpenDMARC is an open source DMARC implementation.

Description

It was found that OpenDMARC did not properly handle DMARC aggregate reports.

Impact

A remote attacker, by sending a specially crafted DMARC aggregate report, could possibly cause a Denial of Service condition and depending on how OpenDMARC library is used in linked application execute arbitrary code with the privileges of the process.

Workaround

There is no known workaround at this time.

Resolution

All OpenDMARC users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=mail-filter/opendmarc-1.3.3"
 

References

Release date
November 03, 2020

Latest revision
November 03, 2020: 1

Severity
normal

Exploitable
local, remote

Bugzilla entries