CVE-2021-20314
Published: 11 August 2021
Stack buffer overflow in libspf2 versions below 1.2.11 when processing certain SPF macros can lead to Denial of service and potentially code execution via malicious crafted SPF explanation messages.
Priority
Status
Package | Release | Status |
---|---|---|
libspf2 Launchpad, Ubuntu, Debian |
bionic |
Released
(1.2.10-7ubuntu0.18.04.1~esm1)
Available with Ubuntu Pro |
focal |
Released
(1.2.10-7+deb9u2build0.20.04.1)
|
|
hirsute |
Ignored
(end of life)
|
|
impish |
Ignored
(end of life)
|
|
jammy |
Not vulnerable
(1.2.10-7.1ubuntu1)
|
|
kinetic |
Ignored
(end of life, was needs-triage)
|
|
lunar |
Not vulnerable
(1.2.10-7.2build1)
|
|
mantic |
Not vulnerable
(1.2.10-7.2build1)
|
|
trusty |
Does not exist
|
|
upstream |
Released
(1.2.11)
|
|
xenial |
Released
(1.2.10-6ubuntu0.1~esm1)
Available with Ubuntu Pro |
|
Patches: upstream: https://github.com/shevek/libspf2/commit/c37b7c13c30e225183899364b9f2efdfa85552ef |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 9.8 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |