7.5
CVSSv2

CVE-2021-20314

Published: 12/08/2021 Updated: 15/01/2024
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Stack buffer overflow in libspf2 versions below 1.2.11 when processing certain SPF macros can lead to Denial of service and potentially code execution via malicious crafted SPF explanation messages.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

libspf2 libspf2

redhat enterprise linux 7.0

fedoraproject fedora 33

fedoraproject fedora 34

fedoraproject fedora 35

Vendor Advisories

Philipp Jeitner and Haya Shulman discovered a stack-based buffer overflow in libspf2, a library for validating mail senders with SPF, which could result in denial of service, or potentially execution of arbitrary code when processing a specially crafted SPF record For the stable distribution (buster), this problem has been fixed in version 1210- ...
A stack buffer overflow in libspf2 versions below 1211 when processing certain SPF macros can lead to denial of service and potentially code execution via malicious crafted SPF explanation messages ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> CVE-2021-20314: Remote stack buffer overflow in libspf2 <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From: "Philipp ...