Your submission was sent successfully! Close

CVE-2020-8794

Published: 25 February 2020

OpenSMTPD before 6.6.4 allows remote code execution because of an out-of-bounds read in mta_io in mta_session.c for multi-line replies. Although this vulnerability affects the client side of OpenSMTPD, it is possible to attack a server because the server code launches the client code during bounce handling.

Priority

High

CVSS 3 base score: 9.8

Status

Package Release Status
opensmtpd
Launchpad, Ubuntu, Debian
bionic
Released (6.0.3p1-1ubuntu0.2)
eoan
Released (6.0.3p1-6ubuntu0.2)
focal
Released (6.6.4p1-1)
groovy
Released (6.6.4p1-1)
hirsute
Released (6.6.4p1-1)
impish
Released (6.6.4p1-1)
jammy
Released (6.6.4p1-1)
precise Does not exist

trusty Does not exist
(trusty was not-affected [code not present])
upstream
Released (6.6.4p1-1)
xenial Ignored
(end of standard support, was needed)