Description
libspf2 before 1.2.11 has a four-byte heap-based buffer overflow that might allow remote attackers to execute arbitrary code (via an unauthenticated e-mail message from anywhere on the Internet) with a crafted SPF DNS record, because of incorrect sprintf usage in SPF_record_expand_data in spf_expand.c. The vulnerable code may be part of the supply chain of a site's e-mail infrastructure (e.g., with additional configuration, Exim can use libspf2; the Postfix web site links to unofficial patches for use of libspf2 with Postfix; older versions of spfquery relied on libspf2) but most often is not.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2890-1 | libspf2 security update |
Ubuntu USN |
USN-6584-1 | Libspf2 vulnerabilities |
Ubuntu USN |
USN-6584-2 | Libspf2 vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T00:05:52.118Z
Reserved: 2021-06-07T00:00:00.000Z
Link: CVE-2021-33912
No data.
Status : Modified
Published: 2022-01-19T18:15:07.783
Modified: 2024-11-21T06:09:45.967
Link: CVE-2021-33912
No data.
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Ubuntu USN