OpenSMTPD before 6.6.4 allows local users to read arbitrary files (e.g., on some Linux distributions) because of a combination of an untrusted search path in makemap.c and race conditions in the offline functionality in smtpd.c.
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2020/Feb/28 | Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2020/02/24/4 | Exploit Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPH4QU4DNVHA7ACFXMYFCEP5PSXXPN4E/ | |
https://usn.ubuntu.com/4294-1/ | Third Party Advisory |
https://www.openbsd.org/security.html | Third Party Advisory |
Configurations
History
07 Nov 2023, 03:26
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2020-02-25 17:15
Updated : 2024-02-28 17:28
NVD link : CVE-2020-8793
Mitre link : CVE-2020-8793
CVE.ORG link : CVE-2020-8793
JSON object : View
Products Affected
canonical
- ubuntu_linux
fedoraproject
- fedora
opensmtpd
- opensmtpd