First published: Tue Jul 11 2023(Updated: )
An issue was discovered in OpenDKIM through 2.10.3, and 2.11.x through 2.11.0-Beta2. It fails to keep track of ordinal numbers when removing fake Authentication-Results header fields, which allows a remote attacker to craft an e-mail message with a fake sender address such that programs that rely on Authentication-Results from OpenDKIM will treat the message as having a valid DKIM signature when in fact it has none.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenDaylight | <=2.10.3 | |
OpenDaylight | =2.11.0-beta1 | |
OpenDaylight | =2.11.0-beta2 | |
OpenDaylight | =2.11.0-beta0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-48521 is classified as a medium severity vulnerability.
To fix CVE-2022-48521, upgrade OpenDKIM to a version above 2.11.0-Beta2.
CVE-2022-48521 affects OpenDKIM versions up to 2.10.3 and 2.11.0-Beta2.
CVE-2022-48521 allows remote attackers to craft e-mail messages with a fake sender address.
Yes, CVE-2022-48521 can be exploited remotely by crafting a malicious e-mail message.