OpenDMARC through 1.3.2 and 1.4.x allows attacks that inject authentication results to provide false information about the domain that originated an e-mail message. This is caused by incorrect parsing and interpretation of SPF/DKIM authentication results, as demonstrated by the example.net(.example.com substring.
{
"binaries": [
{
"binary_name": "libopendmarc-dev",
"binary_version": "1.3.1+dfsg-3ubuntu0.1~esm1"
},
{
"binary_name": "libopendmarc2",
"binary_version": "1.3.1+dfsg-3ubuntu0.1~esm1"
},
{
"binary_name": "opendmarc",
"binary_version": "1.3.1+dfsg-3ubuntu0.1~esm1"
},
{
"binary_name": "rddmarc",
"binary_version": "1.3.1+dfsg-3ubuntu0.1~esm1"
}
],
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}
{
"binaries": [
{
"binary_name": "libopendmarc-dev",
"binary_version": "1.3.2-3ubuntu0.2"
},
{
"binary_name": "libopendmarc2",
"binary_version": "1.3.2-3ubuntu0.2"
},
{
"binary_name": "opendmarc",
"binary_version": "1.3.2-3ubuntu0.2"
},
{
"binary_name": "rddmarc",
"binary_version": "1.3.2-3ubuntu0.2"
}
],
"availability": "No subscription required"
}
{
"binaries": [
{
"binary_name": "libopendmarc-dev",
"binary_version": "1.3.2-7ubuntu0.1"
},
{
"binary_name": "libopendmarc2",
"binary_version": "1.3.2-7ubuntu0.1"
},
{
"binary_name": "opendmarc",
"binary_version": "1.3.2-7ubuntu0.1"
}
],
"availability": "No subscription required"
}