CVE Vulnerabilities

CVE-2020-7247

Improper Handling of Exceptional Conditions

Published: Jan 29, 2020 | Modified: Nov 07, 2023
CVSS 3.x
9.8
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
10 HIGH
AV:N/AC:L/Au:N/C:C/I:C/A:C
RedHat/V2
RedHat/V3
Ubuntu
HIGH

smtp_mailaddr in smtp_session.c in OpenSMTPD 6.6, as used in OpenBSD 6.6 and other products, allows remote attackers to execute arbitrary commands as root via a crafted SMTP session, as demonstrated by shell metacharacters in a MAIL FROM field. This affects the uncommented default configuration. The issue exists because of an incorrect return value upon failure of input validation.

Weakness

The product does not handle or incorrectly handles an exceptional condition.

Affected Software

Name Vendor Start Version End Version
Opensmtpd Openbsd 6.6 (including) 6.6 (including)
Opensmtpd Ubuntu bionic *
Opensmtpd Ubuntu eoan *
Opensmtpd Ubuntu esm-apps/xenial *
Opensmtpd Ubuntu trusty *
Opensmtpd Ubuntu trusty/esm *
Opensmtpd Ubuntu upstream *
Opensmtpd Ubuntu xenial *

References