Debian Libspf2 vulnerabilities
5 known vulnerabilities affecting debian/libspf2.
Total CVEs
5
CISA KEV
0
Public exploits
1
Exploited in wild
0
Severity breakdown
CRITICAL3HIGH2
Vulnerabilities
Page 1 of 1
CVE-2023-42118HIGHCVSS 8.82023
CVE-2023-42118 [HIGH] CVE-2023-42118: libspf2 - Exim libspf2 Integer Underflow Remote Code Execution Vulnerability. This vulnera...
Exim libspf2 Integer Underflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Exim libspf2. Authentication is not required to exploit this vulnerability. The specific flaw exists within the parsing of SPF macros. When parsing SPF macros, the process does not properly va
debian
CVE-2021-33912CRITICALCVSS 9.8fixed in libspf2 1.2.10-7.1 (bookworm)2021
CVE-2021-33912 [CRITICAL] CVE-2021-33912: libspf2 - libspf2 before 1.2.11 has a four-byte heap-based buffer overflow that might allo...
libspf2 before 1.2.11 has a four-byte heap-based buffer overflow that might allow remote attackers to execute arbitrary code (via an unauthenticated e-mail message from anywhere on the Internet) with a crafted SPF DNS record, because of incorrect sprintf usage in SPF_record_expand_data in spf_expand.c. The vulnerable code may be part of the supply chain of a sit
debian
CVE-2021-20314CRITICALCVSS 9.8fixed in libspf2 1.2.10-7.1 (bookworm)2021
CVE-2021-20314 [CRITICAL] CVE-2021-20314: libspf2 - Stack buffer overflow in libspf2 versions below 1.2.11 when processing certain S...
Stack buffer overflow in libspf2 versions below 1.2.11 when processing certain SPF macros can lead to Denial of service and potentially code execution via malicious crafted SPF explanation messages.
Scope: local
bookworm: resolved (fixed in 1.2.10-7.1)
bullseye: resolved (fixed in 1.2.10-7.1~deb11u1)
forky: resolved (fixed in 1.2.10-7.1)
sid: resolved (fixed in
debian
CVE-2021-33913CRITICALCVSS 9.8fixed in libspf2 1.2.10-7.1 (bookworm)2021
CVE-2021-33913 [CRITICAL] CVE-2021-33913: libspf2 - libspf2 before 1.2.11 has a heap-based buffer overflow that might allow remote a...
libspf2 before 1.2.11 has a heap-based buffer overflow that might allow remote attackers to execute arbitrary code (via an unauthenticated e-mail message from anywhere on the Internet) with a crafted SPF DNS record, because of SPF_record_expand_data in spf_expand.c. The amount of overflowed data depends on the relationship between the length of an entire domain
debian
CVE-2008-2469HIGHCVSS 10.0PoCfixed in libspf2 1.2.9-1 (bookworm)2008
CVE-2008-2469 [CRITICAL] CVE-2008-2469: libspf2 - Heap-based buffer overflow in the SPF_dns_resolv_lookup function in Spf_dns_reso...
Heap-based buffer overflow in the SPF_dns_resolv_lookup function in Spf_dns_resolv.c in libspf2 before 1.2.8 allows remote attackers to execute arbitrary code via a long DNS TXT record with a modified length field.
Scope: local
bookworm: resolved (fixed in 1.2.9-1)
bullseye: resolved (fixed in 1.2.9-1)
forky: resolved (fixed in 1.2.9-1)
sid: resolved (fixed in 1.2
debian