OpenDMARC through 1.3.2 and 1.4.x allows attacks that inject authentication results to provide false information about the domain that originated an e-mail message. This is caused by incorrect parsing and interpretation of SPF/DKIM authentication results, as demonstrated by the example.net(.example.com substring.
{
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"binaries": [
{
"binary_version": "1.3.1+dfsg-3ubuntu0.1~esm1",
"binary_name": "libopendmarc-dev"
},
{
"binary_version": "1.3.1+dfsg-3ubuntu0.1~esm1",
"binary_name": "libopendmarc2"
},
{
"binary_version": "1.3.1+dfsg-3ubuntu0.1~esm1",
"binary_name": "opendmarc"
},
{
"binary_version": "1.3.1+dfsg-3ubuntu0.1~esm1",
"binary_name": "rddmarc"
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "1.3.2-3ubuntu0.2",
"binary_name": "libopendmarc-dev"
},
{
"binary_version": "1.3.2-3ubuntu0.2",
"binary_name": "libopendmarc2"
},
{
"binary_version": "1.3.2-3ubuntu0.2",
"binary_name": "opendmarc"
},
{
"binary_version": "1.3.2-3ubuntu0.2",
"binary_name": "rddmarc"
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "1.3.2-7ubuntu0.1",
"binary_name": "libopendmarc-dev"
},
{
"binary_version": "1.3.2-7ubuntu0.1",
"binary_name": "libopendmarc2"
},
{
"binary_version": "1.3.2-7ubuntu0.1",
"binary_name": "opendmarc"
}
]
}