Vulnerability CVE-2020-8794


Published: 2020-02-25

Description:
OpenSMTPD before 6.6.4 allows remote code execution because of an out-of-bounds read in mta_io in mta_session.c for multi-line replies. Although this vulnerability affects the client side of OpenSMTPD, it is possible to attack a server because the server code launches the client code during bounce handling.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
OpenSMTPD Out-Of-Bounds Read
Qualys Security ...
26.02.2020

Type:

CWE-125

(Out-of-bounds Read)

CVSS2 => (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
10/10
10/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Opensmtpd -> Opensmtpd 

 References:
http://seclists.org/fulldisclosure/2020/Feb/32
http://www.openwall.com/lists/oss-security/2020/02/26/1
http://www.openwall.com/lists/oss-security/2020/03/01/1
http://www.openwall.com/lists/oss-security/2020/03/01/2
https://www.debian.org/security/2020/dsa-4634
https://www.openbsd.org/security.html
https://www.openwall.com/lists/oss-security/2020/02/24/5

Copyright 2024, cxsecurity.com

 

Back to Top