OpenSMTPD before 6.6.4 allows remote code execution because of an out-of-bounds read in mta_io in mta_session.c for multi-line replies. Although this vulnerability affects the client side of OpenSMTPD, it is possible to attack a server because the server code launches the client code during bounce handling.

Project Subscriptions

Vendors Products
Canonical Subscribe
Ubuntu Linux Subscribe
Debian Linux Subscribe
Fedoraproject Subscribe
Opensmtpd Subscribe
Opensmtpd Subscribe
Advisories
Source ID Title
Debian DSA Debian DSA DSA-4634-1 opensmtpd security update
Ubuntu USN Ubuntu USN USN-4294-1 OpenSMTPD vulnerabilities
Ubuntu USN Ubuntu USN USN-4875-1 OpenSMTPD vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T10:12:10.566Z

Reserved: 2020-02-07T00:00:00

Link: CVE-2020-8794

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-02-25T17:15:13.197

Modified: 2024-11-21T05:39:27.113

Link: CVE-2020-8794

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses