CVE Vulnerabilities

CVE-2020-35680

NULL Pointer Dereference

Published: Dec 24, 2020 | Modified: Nov 21, 2024
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

smtpd/lka_filter.c in OpenSMTPD before 6.8.0p1, in certain configurations, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted pattern of client activity, because the filter state machine does not properly maintain the I/O channel between the SMTP engine and the filters layer.

Weakness

The product dereferences a pointer that it expects to be valid but is NULL.

Affected Software

NameVendorStart VersionEnd Version
OpensmtpdOpensmtpd*6.8.0 (excluding)
OpensmtpdOpensmtpd6.8.0 (including)6.8.0 (including)
OpensmtpdOpensmtpd6.8.0-patch1-rc1 (including)6.8.0-patch1-rc1 (including)
OpensmtpdUbuntudevel*
OpensmtpdUbuntuesm-apps/focal*
OpensmtpdUbuntuesm-apps/jammy*
OpensmtpdUbuntuesm-apps/noble*
OpensmtpdUbuntufocal*
OpensmtpdUbuntugroovy*
OpensmtpdUbuntuhirsute*
OpensmtpdUbuntuimpish*
OpensmtpdUbuntujammy*
OpensmtpdUbuntukinetic*
OpensmtpdUbuntulunar*
OpensmtpdUbuntumantic*
OpensmtpdUbuntunoble*
OpensmtpdUbuntuoracular*
OpensmtpdUbuntuplucky*
OpensmtpdUbuntuquesting*
OpensmtpdUbuntutrusty*
OpensmtpdUbuntutrusty/esm*

Potential Mitigations

References