OpenDMARC through 1.3.2 and 1.4.x allows attacks that inject authentication results to provide false information about the domain that originated an e-mail message. This is caused by incorrect parsing and interpretation of SPF/DKIM authentication results, as demonstrated by the example.net(.example.com substring.
{ "binaries": [ { "binary_name": "libopendmarc-dev", "binary_version": "1.3.1+dfsg-3ubuntu0.1~esm1" }, { "binary_name": "libopendmarc2", "binary_version": "1.3.1+dfsg-3ubuntu0.1~esm1" }, { "binary_name": "opendmarc", "binary_version": "1.3.1+dfsg-3ubuntu0.1~esm1" }, { "binary_name": "rddmarc", "binary_version": "1.3.1+dfsg-3ubuntu0.1~esm1" } ], "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro" }
{ "binaries": [ { "binary_name": "libopendmarc-dev", "binary_version": "1.3.2-3ubuntu0.2" }, { "binary_name": "libopendmarc2", "binary_version": "1.3.2-3ubuntu0.2" }, { "binary_name": "opendmarc", "binary_version": "1.3.2-3ubuntu0.2" }, { "binary_name": "rddmarc", "binary_version": "1.3.2-3ubuntu0.2" } ], "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "libopendmarc-dev", "binary_version": "1.3.2-7ubuntu0.1" }, { "binary_name": "libopendmarc2", "binary_version": "1.3.2-7ubuntu0.1" }, { "binary_name": "opendmarc", "binary_version": "1.3.2-7ubuntu0.1" } ], "availability": "No subscription required" }