Use-after-free vulnerability in OpenSMTPD before 5.7.2 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via vectors involving req_ca_vrfy_smtp and req_ca_vrfy_mta.
References
Configurations
History
21 Nov 2024, 02:37
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.fedoraproject.org/pipermail/package-announce/2015-November/170448.html - Third Party Advisory | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169600.html - Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2015/10/03/1 - Mailing List, Third Party Advisory, VDB Entry | |
References | () http://www.securityfocus.com/bid/76975 - Third Party Advisory, VDB Entry | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1268793 - Issue Tracking, Third Party Advisory, VDB Entry | |
References | () https://www.opensmtpd.org/announces/release-5.7.2.txt - Release Notes, Vendor Advisory | |
References | () https://www.qualys.com/2015/10/02/opensmtpd-audit-report.txt - Exploit, Technical Description, Third Party Advisory |
Information
Published : 2017-10-16 18:29
Updated : 2024-11-21 02:37
NVD link : CVE-2015-7687
Mitre link : CVE-2015-7687
CVE.ORG link : CVE-2015-7687
JSON object : View
Products Affected
openbsd
- opensmtpd
fedoraproject
- fedora
CWE
CWE-416
Use After Free