CVE-2021-33912
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
libspf2 before 1.2.11 has a four-byte heap-based buffer overflow that might allow remote attackers to execute arbitrary code (via an unauthenticated e-mail message from anywhere on the Internet) with a crafted SPF DNS record, because of incorrect sprintf usage in SPF_record_expand_data in spf_expand.c. The vulnerable code may be part of the supply chain of a site's e-mail infrastructure (e.g., with additional configuration, Exim can use libspf2; the Postfix web site links to unofficial patches for use of libspf2 with Postfix; older versions of spfquery relied on libspf2) but most often is not.
libspf2 versiones anteriores a 1.2.11, presenta un desbordamiento de búfer de cuatro bytes en la región heap de la memoria que podría permitir a atacantes remotos ejecutar código arbitrario (por medio de un mensaje de correo electrónico no autenticado desde cualquier lugar de Internet) con un registro DNS SPF diseñado, debido al uso incorrecto de sprintf en el archivo SPF_record_expand_data en spf_expand.c. El código vulnerable puede ser parte de la cadena de suministro de la infraestructura de correo electrónico de un sitio (por ejemplo, con una configuración adicional, Exim puede usar libspf2; el sitio web de Postfix enlaza con parches no oficiales para el uso de libspf2 con Postfix; las versiones más antiguas de spfquery dependían de libspf2), pero lo más frecuente es que no lo sea
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-06-07 CVE Reserved
- 2022-01-19 CVE Published
- 2024-08-04 CVE Updated
- 2024-08-04 First Exploit
- 2024-10-04 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-787: Out-of-bounds Write
CAPEC
References (4)
URL | Tag | Source |
---|---|---|
https://github.com/shevek/libspf2/tree/8131fe140704eaae695e76b5cd09e39bd1dd220b | Third Party Advisory | |
https://lists.debian.org/debian-lts-announce/2022/01/msg00015.html | Mailing List |
URL | Date | SRC |
---|---|---|
https://nathanielbennett.com/blog/libspf2-cve-jan-2022-disclosure | 2024-08-04 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://security.gentoo.org/glsa/202401-22 | 2024-01-15 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Libspf2 Project Search vendor "Libspf2 Project" | Libspf2 Search vendor "Libspf2 Project" for product "Libspf2" | < 1.2.11 Search vendor "Libspf2 Project" for product "Libspf2" and version " < 1.2.11" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 9.0 Search vendor "Debian" for product "Debian Linux" and version "9.0" | - |
Affected
|