ID |
CVE-2020-7247
|
Summary |
smtp_mailaddr in smtp_session.c in OpenSMTPD 6.6, as used in OpenBSD 6.6 and other products, allows remote attackers to execute arbitrary commands as root via a crafted SMTP session, as demonstrated by shell metacharacters in a MAIL FROM field. This affects the "uncommented" default configuration. The issue exists because of an incorrect return value upon failure of input validation. |
References |
|
Vulnerable Configurations |
-
cpe:2.3:a:openbsd:opensmtpd:6.6:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:opensmtpd:6.6:*:*:*:*:*:*:*
-
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
-
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
-
cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
-
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
-
cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
|
CVSS |
Base: | 10.0 (as of 16-07-2024 - 17:40) |
Impact: | |
Exploitability: | |
|
CWE |
CWE-755 |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
NETWORK |
LOW |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
COMPLETE |
COMPLETE |
COMPLETE |
|
cvss-vector
via4
|
AV:N/AC:L/Au:N/C:C/I:C/A:C
|
refmap
via4
|
bugtraq | 20200129 [SECURITY] [DSA 4611-1] opensmtpd security update | cert-vn | VU#390745 | confirm | | debian | DSA-4611 | fedora | FEDORA-2020-b92d7083ca | fulldisc | 20200131 LPE and RCE in OpenSMTPD (CVE-2020-7247) | misc | | ubuntu | USN-4268-1 |
|
saint
via4
|
description | OpenSMTPD MAIL FROM command injection | id | mail_smtp_opensmtpd | title | opensmtpd_mail_from | type | remote |
|
Last major update |
16-07-2024 - 17:40 |
Published |
29-01-2020 - 16:15 |
Last modified |
16-07-2024 - 17:40 |