USN-4268-1: OpenSMTPD vulnerability
5 February 2020
OpenSMTPD could be made to run programs as root if it received specially crafted input over the network.
Releases
Packages
- opensmtpd - secure, reliable, lean, and easy-to configure SMTP server
Details
It was discovered that OpenSMTPD incorrectly verified the sender's or
receiver's e-mail addresses under certain conditions. An attacker could use
this vulnerability to execute arbitrary commands as root.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 19.10
Ubuntu 18.04
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-4875-1: opensmtpd