OpenDMARC through 1.3.2 and 1.4.x, when used with pypolicyd-spf 2.0.2, allows attacks that bypass SPF and DMARC authentication in situations where the HELO field is inconsistent with the MAIL FROM field.
{ "binaries": [ { "binary_name": "libopendmarc-dev", "binary_version": "1.3.1+dfsg-3ubuntu0.1~esm1" }, { "binary_name": "libopendmarc2", "binary_version": "1.3.1+dfsg-3ubuntu0.1~esm1" }, { "binary_name": "opendmarc", "binary_version": "1.3.1+dfsg-3ubuntu0.1~esm1" }, { "binary_name": "rddmarc", "binary_version": "1.3.1+dfsg-3ubuntu0.1~esm1" } ] }
{ "binaries": [ { "binary_name": "libopendmarc-dev", "binary_version": "1.3.2-3ubuntu0.2" }, { "binary_name": "libopendmarc2", "binary_version": "1.3.2-3ubuntu0.2" }, { "binary_name": "opendmarc", "binary_version": "1.3.2-3ubuntu0.2" }, { "binary_name": "rddmarc", "binary_version": "1.3.2-3ubuntu0.2" } ] }