CVE-2021-33913
Vulnerability from cvelistv5
Published
2022-01-19 00:00
Modified
2024-08-04 00:05
Severity ?
EPSS score ?
Summary
libspf2 before 1.2.11 has a heap-based buffer overflow that might allow remote attackers to execute arbitrary code (via an unauthenticated e-mail message from anywhere on the Internet) with a crafted SPF DNS record, because of SPF_record_expand_data in spf_expand.c. The amount of overflowed data depends on the relationship between the length of an entire domain name and the length of its leftmost label. The vulnerable code may be part of the supply chain of a site's e-mail infrastructure (e.g., with additional configuration, Exim can use libspf2; the Postfix web site links to unofficial patches for use of libspf2 with Postfix; older versions of spfquery relied on libspf2) but most often is not.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/shevek/libspf2/tree/8131fe140704eaae695e76b5cd09e39bd1dd220b | Third Party Advisory | |
cve@mitre.org | https://lists.debian.org/debian-lts-announce/2022/01/msg00015.html | Mailing List, Third Party Advisory | |
cve@mitre.org | https://nathanielbennett.com/blog/libspf2-cve-jan-2022-disclosure | Exploit, Third Party Advisory | |
cve@mitre.org | https://security.gentoo.org/glsa/202401-22 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/shevek/libspf2/tree/8131fe140704eaae695e76b5cd09e39bd1dd220b | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2022/01/msg00015.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://nathanielbennett.com/blog/libspf2-cve-jan-2022-disclosure | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/202401-22 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:05:51.790Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/shevek/libspf2/tree/8131fe140704eaae695e76b5cd09e39bd1dd220b" }, { "tags": [ "x_transferred" ], "url": "https://nathanielbennett.com/blog/libspf2-cve-jan-2022-disclosure" }, { "name": "[debian-lts-announce] 20220121 [SECURITY] [DLA 2890-1] libspf2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2022/01/msg00015.html" }, { "name": "GLSA-202401-22", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202401-22" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "libspf2 before 1.2.11 has a heap-based buffer overflow that might allow remote attackers to execute arbitrary code (via an unauthenticated e-mail message from anywhere on the Internet) with a crafted SPF DNS record, because of SPF_record_expand_data in spf_expand.c. The amount of overflowed data depends on the relationship between the length of an entire domain name and the length of its leftmost label. The vulnerable code may be part of the supply chain of a site\u0027s e-mail infrastructure (e.g., with additional configuration, Exim can use libspf2; the Postfix web site links to unofficial patches for use of libspf2 with Postfix; older versions of spfquery relied on libspf2) but most often is not." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-15T17:06:15.903756", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://github.com/shevek/libspf2/tree/8131fe140704eaae695e76b5cd09e39bd1dd220b" }, { "url": "https://nathanielbennett.com/blog/libspf2-cve-jan-2022-disclosure" }, { "name": "[debian-lts-announce] 20220121 [SECURITY] [DLA 2890-1] libspf2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2022/01/msg00015.html" }, { "name": "GLSA-202401-22", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202401-22" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-33913", "datePublished": "2022-01-19T00:00:00", "dateReserved": "2021-06-07T00:00:00", "dateUpdated": "2024-08-04T00:05:51.790Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2021-33913\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2022-01-19T18:15:07.830\",\"lastModified\":\"2024-11-21T06:09:46.133\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"libspf2 before 1.2.11 has a heap-based buffer overflow that might allow remote attackers to execute arbitrary code (via an unauthenticated e-mail message from anywhere on the Internet) with a crafted SPF DNS record, because of SPF_record_expand_data in spf_expand.c. The amount of overflowed data depends on the relationship between the length of an entire domain name and the length of its leftmost label. The vulnerable code may be part of the supply chain of a site\u0027s e-mail infrastructure (e.g., with additional configuration, Exim can use libspf2; the Postfix web site links to unofficial patches for use of libspf2 with Postfix; older versions of spfquery relied on libspf2) but most often is not.\"},{\"lang\":\"es\",\"value\":\"libspf2 versiones anteriores a 1.2.11, presenta un desbordamiento de b\u00fafer en la regi\u00f3n heap de la memoria que podr\u00eda permitir a atacantes remotos ejecutar c\u00f3digo arbitrario (por medio de un mensaje de correo electr\u00f3nico no autenticado desde cualquier lugar de Internet) con un registro DNS SPF dise\u00f1ado, debido a SPF_record_expand_data en el archivo spf_expand.c. La cantidad de datos desbordados depende de la relaci\u00f3n entre la longitud de un nombre de dominio completo y la longitud de su etiqueta m\u00e1s a la izquierda. El c\u00f3digo vulnerable puede formar parte de la cadena de suministro de la infraestructura de correo electr\u00f3nico de un sitio (por ejemplo, con una configuraci\u00f3n adicional, Exim puede usar libspf2; el sitio web de Postfix enlaza con parches no oficiales para el uso de libspf2 con Postfix; las versiones m\u00e1s antiguas de spfquery depend\u00edan de libspf2), pero lo m\u00e1s frecuente es que no lo sea\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:C/I:C/A:C\",\"baseScore\":9.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libspf2_project:libspf2:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.2.11\",\"matchCriteriaId\":\"B9926529-9106-4A0B-85FA-F1E286816711\"}]}]}],\"references\":[{\"url\":\"https://github.com/shevek/libspf2/tree/8131fe140704eaae695e76b5cd09e39bd1dd220b\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2022/01/msg00015.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://nathanielbennett.com/blog/libspf2-cve-jan-2022-disclosure\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202401-22\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://github.com/shevek/libspf2/tree/8131fe140704eaae695e76b5cd09e39bd1dd220b\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2022/01/msg00015.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://nathanielbennett.com/blog/libspf2-cve-jan-2022-disclosure\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202401-22\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.