[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244411

 
 

909

 
 

193363

 
 

277

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2019-16378Date: (C)2019-09-18   (M)2023-12-22


OpenDMARC through 1.3.2 and 1.4.x through 1.4.0-Beta1 is prone to a signature-bypass vulnerability with multiple From: addresses, which might affect applications that consider a domain name to be relevant to the origin of an e-mail message.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 9.8CVSS Score : 7.5
Exploit Score: 3.9Exploit Score: 10.0
Impact Score: 5.9Impact Score: 6.4
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: NETWORKAccess Vector: NETWORK
Attack Complexity: LOWAccess Complexity: LOW
Privileges Required: NONEAuthentication: NONE
User Interaction: NONEConfidentiality: PARTIAL
Scope: UNCHANGEDIntegrity: PARTIAL
Confidentiality: HIGHAvailability: PARTIAL
Integrity: HIGH 
Availability: HIGH 
  
Reference:
https://seclists.org/bugtraq/2019/Sep/36
DSA-4526
FEDORA-2019-24b3f84f6e
FEDORA-2019-6a2ca74e55
FEDORA-2019-e1f0417a24
USN-4567-1
http://www.openwall.com/lists/oss-security/2019/09/17/2
https://bugs.debian.org/940081
https://github.com/trusteddomainproject/OpenDMARC/pull/48
https://www.openwall.com/lists/oss-security/2019/09/11/8

CPE    3
cpe:/o:debian:debian_linux:9.0
cpe:/o:canonical:ubuntu_linux:18.04::~~lts~~~
cpe:/a:trusteddomain:opendmarc
CWE    1
CWE-290
OVAL    7
oval:org.secpod.oval:def:67161
oval:org.secpod.oval:def:117209
oval:org.secpod.oval:def:117197
oval:org.secpod.oval:def:705688
...

© SecPod Technologies