smtp_mailaddr in smtp_session.c in OpenSMTPD 6.6, as used in OpenBSD 6.6 and other products, allows remote attackers to execute arbitrary commands as root via a crafted SMTP session, as demonstrated by shell metacharacters in a MAIL FROM field. This affects the "uncommented" default configuration. The issue exists because of an incorrect return value upon failure of input validation.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
21 Nov 2024, 05:36
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/156137/OpenBSD-OpenSMTPD-Privilege-Escalation-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/156145/OpenSMTPD-6.6.2-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/156249/OpenSMTPD-MAIL-FROM-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/156295/OpenSMTPD-6.6.1-Local-Privilege-Escalation.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/162093/OpenBSD-OpenSMTPD-6.6-Remote-Code-Execution.html - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://seclists.org/fulldisclosure/2020/Jan/49 - Exploit, Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2020/01/28/3 - Exploit, Mailing List, Third Party Advisory | |
References | () https://github.com/openbsd/src/commit/9dcfda045474d8903224d175907bfc29761dcb45 - Patch | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPH4QU4DNVHA7ACFXMYFCEP5PSXXPN4E/ - Mailing List, Third Party Advisory | |
References | () https://seclists.org/bugtraq/2020/Jan/51 - Mailing List, Third Party Advisory | |
References | () https://usn.ubuntu.com/4268-1/ - Third Party Advisory | |
References | () https://www.debian.org/security/2020/dsa-4611 - Mailing List, Third Party Advisory | |
References | () https://www.kb.cert.org/vuls/id/390745 - Third Party Advisory, US Government Resource | |
References | () https://www.openbsd.org/security.html - Patch, Vendor Advisory |
16 Jul 2024, 17:40
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/156145/OpenSMTPD-6.6.2-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/162093/OpenBSD-OpenSMTPD-6.6-Remote-Code-Execution.html - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://seclists.org/fulldisclosure/2020/Jan/49 - Exploit, Mailing List, Third Party Advisory | |
References | () https://github.com/openbsd/src/commit/9dcfda045474d8903224d175907bfc29761dcb45 - Patch | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPH4QU4DNVHA7ACFXMYFCEP5PSXXPN4E/ - Mailing List, Third Party Advisory | |
References | () https://www.debian.org/security/2020/dsa-4611 - Mailing List, Third Party Advisory |
07 Nov 2023, 03:25
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2020-01-29 16:15
Updated : 2024-11-21 05:36
NVD link : CVE-2020-7247
Mitre link : CVE-2020-7247
CVE.ORG link : CVE-2020-7247
JSON object : View
Products Affected
openbsd
- opensmtpd
debian
- debian_linux
fedoraproject
- fedora
canonical
- ubuntu_linux