Debian Security Advisory

DLA-2639-1 opendmarc -- LTS security update

Date Reported:
25 Apr 2021
Affected Packages:
opendmarc
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 966464.
In Mitre's CVE dictionary: CVE-2020-12460.
More information:

It was discovered that OpenDMARC, a milter implementation of DMARC, has improper null termination in the function opendmarc_xml_parse that can result in a one-byte heap overflow in opendmarc_xml when parsing a specially crafted DMARC aggregate report. This can cause remote memory corruption when a '\0' byte overwrites the heap metadata of the next chunk and its PREV_INUSE flag.

For Debian 9 stretch, this problem has been fixed in version 1.3.2-2+deb9u3.

We recommend that you upgrade your opendmarc packages.

For the detailed security status of opendmarc please refer to its security tracker page at: https://security-tracker.debian.org/tracker/opendmarc

Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS