CVE-2020-8794
25.02.2020, 17:15
OpenSMTPD before 6.6.4 allows remote code execution because of an out-of-bounds read in mta_io in mta_session.c for multi-line replies. Although this vulnerability affects the client side of OpenSMTPD, it is possible to attack a server because the server code launches the client code during bounce handling.Enginsight
Vendor | Product | Version |
---|---|---|
opensmtpd | opensmtpd | 𝑥 < 6.6.4 |
canonical | ubuntu_linux | 18.04 |
canonical | ubuntu_linux | 19.10 |
debian | debian_linux | 9.0 |
debian | debian_linux | 10.0 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
opensmtpd |
|
Common Weakness Enumeration
References