ALT-PU-2018-2811-2
Closed vulnerabilities
BDU:2024-06034
Уязвимость компонента Fake Authentication Result Handler программного обеспечения DKIM-фильтра OpenDKIM, позволяющая нарушителю оказывать влияние на целостность защищаемой информации
Modified: 2024-11-21
CVE-2020-35766
The test suite in libopendkim in OpenDKIM through 2.10.3 allows local users to gain privileges via a symlink attack against the /tmp/testkeys file (related to t-testdata.h, t-setup.c, and t-cleanup.c). NOTE: this is applicable to persons who choose to engage in the "A number of self-test programs are included here for unit-testing the library" situation.
Modified: 2024-11-21
CVE-2022-48521
An issue was discovered in OpenDKIM through 2.10.3, and 2.11.x through 2.11.0-Beta2. It fails to keep track of ordinal numbers when removing fake Authentication-Results header fields, which allows a remote attacker to craft an e-mail message with a fake sender address such that programs that rely on Authentication-Results from OpenDKIM will treat the message as having a valid DKIM signature when in fact it has none.
