libspf2 before 1.2.11 has a four-byte heap-based buffer overflow that might allow remote attackers to execute arbitrary code (via an unauthenticated e-mail message from anywhere on the Internet) with a crafted SPF DNS record, because of incorrect sprintf usage in SPFrecordexpanddata in spfexpand.c. The vulnerable code may be part of the supply chain of a site's e-mail infrastructure (e.g., with additional configuration, Exim can use libspf2; the Postfix web site links to unofficial patches for use of libspf2 with Postfix; older versions of spfquery relied on libspf2) but most often is not.
{
"binaries": [
{
"binary_version": "1.2.10-6ubuntu0.1~esm2",
"binary_name": "libmail-spf-xs-perl"
},
{
"binary_version": "1.2.10-6ubuntu0.1~esm2",
"binary_name": "libspf2-2"
},
{
"binary_version": "1.2.10-6ubuntu0.1~esm2",
"binary_name": "libspf2-dev"
},
{
"binary_version": "1.2.10-6ubuntu0.1~esm2",
"binary_name": "spfquery"
}
],
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}
{
"binaries": [
{
"binary_version": "1.2.10-7ubuntu0.18.04.1~esm1",
"binary_name": "libmail-spf-xs-perl"
},
{
"binary_version": "1.2.10-7ubuntu0.18.04.1~esm1",
"binary_name": "libspf2-2"
},
{
"binary_version": "1.2.10-7ubuntu0.18.04.1~esm1",
"binary_name": "libspf2-dev"
},
{
"binary_version": "1.2.10-7ubuntu0.18.04.1~esm1",
"binary_name": "spfquery"
}
],
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}
{
"binaries": [
{
"binary_version": "1.2.10-7+deb9u2build0.20.04.1",
"binary_name": "libmail-spf-xs-perl"
},
{
"binary_version": "1.2.10-7+deb9u2build0.20.04.1",
"binary_name": "libspf2-2"
},
{
"binary_version": "1.2.10-7+deb9u2build0.20.04.1",
"binary_name": "libspf2-dev"
},
{
"binary_version": "1.2.10-7+deb9u2build0.20.04.1",
"binary_name": "spfquery"
}
],
"availability": "No subscription required"
}