CVE Vulnerabilities

CVE-2020-8793

Time-of-check Time-of-use (TOCTOU) Race Condition

Published: Feb 25, 2020 | Modified: Nov 21, 2024
CVSS 3.x
4.7
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
4.7 MEDIUM
AV:L/AC:M/Au:N/C:C/I:N/A:N
RedHat/V2
RedHat/V3
Ubuntu
LOW

OpenSMTPD before 6.6.4 allows local users to read arbitrary files (e.g., on some Linux distributions) because of a combination of an untrusted search path in makemap.c and race conditions in the offline functionality in smtpd.c.

Weakness

The product checks the state of a resource before using that resource, but the resource’s state can change between the check and the use in a way that invalidates the results of the check.

Affected Software

Name Vendor Start Version End Version
Opensmtpd Opensmtpd * 6.6.4 (excluding)
Opensmtpd Ubuntu bionic *
Opensmtpd Ubuntu devel *
Opensmtpd Ubuntu eoan *
Opensmtpd Ubuntu esm-apps/bionic *
Opensmtpd Ubuntu esm-apps/focal *
Opensmtpd Ubuntu esm-apps/jammy *
Opensmtpd Ubuntu esm-apps/noble *
Opensmtpd Ubuntu esm-apps/xenial *
Opensmtpd Ubuntu esm-infra-legacy/trusty *
Opensmtpd Ubuntu focal *
Opensmtpd Ubuntu groovy *
Opensmtpd Ubuntu hirsute *
Opensmtpd Ubuntu impish *
Opensmtpd Ubuntu jammy *
Opensmtpd Ubuntu kinetic *
Opensmtpd Ubuntu lunar *
Opensmtpd Ubuntu mantic *
Opensmtpd Ubuntu noble *
Opensmtpd Ubuntu oracular *
Opensmtpd Ubuntu plucky *
Opensmtpd Ubuntu trusty *
Opensmtpd Ubuntu trusty/esm *
Opensmtpd Ubuntu xenial *

Potential Mitigations

References