CVE-2020-8794

Published: 25 February 2020

OpenSMTPD before 6.6.4 allows remote code execution because of an out-of-bounds read in mta_io in mta_session.c for multi-line replies. Although this vulnerability affects the client side of OpenSMTPD, it is possible to attack a server because the server code launches the client code during bounce handling.

Priority

High

CVSS 3 base score: 9.8

Status

Package Release Status
opensmtpd
Launchpad, Ubuntu, Debian
Upstream
Released (6.6.4p1-1)
Ubuntu 21.10 (Impish Indri)
Released (6.6.4p1-1)
Ubuntu 21.04 (Hirsute Hippo)
Released (6.6.4p1-1)
Ubuntu 20.04 LTS (Focal Fossa)
Released (6.6.4p1-1)
Ubuntu 18.04 LTS (Bionic Beaver)
Released (6.0.3p1-1ubuntu0.2)
Ubuntu 16.04 ESM (Xenial Xerus) Ignored
(end of standard support, was needed)
Ubuntu 14.04 ESM (Trusty Tahr) Does not exist
(trusty was not-affected [code not present])