CVE Vulnerabilities

CVE-2020-8793

Time-of-check Time-of-use (TOCTOU) Race Condition

Published: Feb 25, 2020 | Modified: Nov 21, 2024
CVSS 3.x
4.7
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
4.7 MEDIUM
AV:L/AC:M/Au:N/C:C/I:N/A:N
RedHat/V2
RedHat/V3
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

OpenSMTPD before 6.6.4 allows local users to read arbitrary files (e.g., on some Linux distributions) because of a combination of an untrusted search path in makemap.c and race conditions in the offline functionality in smtpd.c.

Weakness

The product checks the state of a resource before using that resource, but the resource’s state can change between the check and the use in a way that invalidates the results of the check.

Affected Software

NameVendorStart VersionEnd Version
OpensmtpdOpensmtpd*6.6.4 (excluding)
OpensmtpdUbuntubionic*
OpensmtpdUbuntudevel*
OpensmtpdUbuntueoan*
OpensmtpdUbuntuesm-apps/bionic*
OpensmtpdUbuntuesm-apps/focal*
OpensmtpdUbuntuesm-apps/jammy*
OpensmtpdUbuntuesm-apps/noble*
OpensmtpdUbuntuesm-apps/xenial*
OpensmtpdUbuntuesm-infra-legacy/trusty*
OpensmtpdUbuntufocal*
OpensmtpdUbuntugroovy*
OpensmtpdUbuntuhirsute*
OpensmtpdUbuntuimpish*
OpensmtpdUbuntujammy*
OpensmtpdUbuntukinetic*
OpensmtpdUbuntulunar*
OpensmtpdUbuntumantic*
OpensmtpdUbuntunoble*
OpensmtpdUbuntuoracular*
OpensmtpdUbuntuplucky*
OpensmtpdUbuntuquesting*
OpensmtpdUbuntutrusty*
OpensmtpdUbuntutrusty/esm*
OpensmtpdUbuntuxenial*

Potential Mitigations

References