Package: opendkim
Version: 2.11.0~beta2-8
Followup-For: Bug #1041107

To expand on the brief CVE description:

When OpenDKIM removes fake Authentication-Results fields (as required in
https://www.rfc-editor.org/rfc/rfc8601#section-5), it doesn't account for
the fact that – at least in Postfix – this changes the ordinal numbers of
the following header fields, so it passes the wrong number to the MTA for
the second and following header fields it removes. If there are more than
one fake Authentication-Results fields, then OpenDKIM leaves some of them
in place. Thus a fake Authentication-Results field can bypass OpenDKIM,
and be relied on by other programs as if it had been added by OpenDKIM.
An email message may be accepted when by policy it should be rejected,
and/or the recipient can be tricked into believing that the sender is
someone they trust.

It seems unlikely that the vulnerability will be fixed upstream. Sysadmins
should know that Authentication-Results from OpenDKIM can't be trusted
unless some other program removes fake Authentication-Results fields from
incoming messages before OpenDKIM processes them.

A note for anyone who wants to develop a patch:

The Libmilter API documentation doesn't specify whether removing a header
field renumbers the following header fields, so hypothetically different
MTAs could do it differently without violating the API specification. The
safe way to handle the ambiguity is to remove header fields in reverse
order.

Reply via email to