CVE-2021-20314
Published: 11 August 2021
Stack buffer overflow in libspf2 versions below 1.2.11 when processing certain SPF macros can lead to Denial of service and potentially code execution via malicious crafted SPF explanation messages.
Priority
Status
Package | Release | Status |
---|---|---|
libspf2 Launchpad, Ubuntu, Debian |
impish |
Ignored
(end of life)
|
upstream |
Released
(1.2.11)
|
|
trusty |
Does not exist
|
|
hirsute |
Ignored
(end of life)
|
|
kinetic |
Ignored
(end of life, was needs-triage)
|
|
jammy |
Not vulnerable
(1.2.10-7.1ubuntu1)
|
|
lunar |
Not vulnerable
(1.2.10-7.2build1)
|
|
mantic |
Not vulnerable
(1.2.10-7.2build1)
|
|
bionic |
Released
(1.2.10-7ubuntu0.18.04.1~esm1)
Available with Ubuntu Pro |
|
focal |
Released
(1.2.10-7+deb9u2build0.20.04.1)
|
|
xenial |
Released
(1.2.10-6ubuntu0.1~esm1)
Available with Ubuntu Pro |
|
Patches: upstream: https://github.com/shevek/libspf2/commit/c37b7c13c30e225183899364b9f2efdfa85552ef |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 9.8 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |