Debian Security Advisory
DLA-2639-1 opendmarc -- LTS security update
- Date Reported:
- 25 Apr 2021
- Affected Packages:
- Security database references:
- In the Debian bugtracking system: Bug 966464.
In Mitre's CVE dictionary: CVE-2020-12460.
- More information:
It was discovered that OpenDMARC, a milter implementation of DMARC, has improper null termination in the function opendmarc_xml_parse that can result in a one-byte heap overflow in opendmarc_xml when parsing a specially crafted DMARC aggregate report. This can cause remote memory corruption when a '\0' byte overwrites the heap metadata of the next chunk and its PREV_INUSE flag.
For Debian 9 stretch, this problem has been fixed in version 1.3.2-2+deb9u3.
We recommend that you upgrade your opendmarc packages.
For the detailed security status of opendmarc please refer to its security tracker page at: https://security-tracker.debian.org/tracker/opendmarc
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS