CVE-2020-8794

Name
CVE-2020-8794
Description
OpenSMTPD before 6.6.4 allows remote code execution because of an out-of-bounds read in mta_io in mta_session.c for multi-line replies. Although this vulnerability affects the client side of OpenSMTPD, it is possible to attack a server because the server code launches the client code during bounce handling.
NVD Severity
high
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Third Party Advisory https://www.openbsd.org/security.html
Exploit https://www.openwall.com/lists/oss-security/2020/02/24/5
MLIST http://www.openwall.com/lists/oss-security/2020/02/26/1
DEBIAN https://www.debian.org/security/2020/dsa-4634
FULLDISC http://seclists.org/fulldisclosure/2020/Feb/32
MLIST http://www.openwall.com/lists/oss-security/2020/03/01/1
MLIST http://www.openwall.com/lists/oss-security/2020/03/01/2
MISC http://packetstormsecurity.com/files/156633/OpenSMTPD-Out-Of-Bounds-Read-Local-Privilege-Escalation.html
FEDORA https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPH4QU4DNVHA7ACFXMYFCEP5PSXXPN4E/
UBUNTU https://usn.ubuntu.com/4294-1/
MLIST http://www.openwall.com/lists/oss-security/2021/05/04/7

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:opensmtpd:opensmtpd:*:*:*:*:*:*:*:* opensmtpd >= None < 6.6.4

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
opensmtpd 3.10-main 6.0.3p1-r3 Jonathan Curran <jonathan@curran.in> possibly vulnerable