CVE-2020-8794

OpenSMTPD before 6.6.4 allows remote code execution because of an out-of-bounds read in mta_io in mta_session.c for multi-line replies. Although this vulnerability affects the client side of OpenSMTPD, it is possible to attack a server because the server code launches the client code during bounce handling.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 99%
VendorProductVersion
opensmtpdopensmtpd
𝑥
< 6.6.4
canonicalubuntu_linux
18.04
canonicalubuntu_linux
19.10
debiandebian_linux
9.0
debiandebian_linux
10.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
opensmtpd
bullseye
6.8.0p2-3
fixed
bookworm
6.8.0p2-4
fixed
sid
7.5.0p0-1
fixed
trixie
7.5.0p0-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
opensmtpd
noble
Fixed 6.6.4p1-1
released
mantic
Fixed 6.6.4p1-1
released
lunar
Fixed 6.6.4p1-1
released
kinetic
Fixed 6.6.4p1-1
released
jammy
Fixed 6.6.4p1-1
released
impish
Fixed 6.6.4p1-1
released
hirsute
Fixed 6.6.4p1-1
released
groovy
Fixed 6.6.4p1-1
released
focal
Fixed 6.6.4p1-1
released
eoan
Fixed 6.0.3p1-6ubuntu0.2
released
bionic
Fixed 6.0.3p1-1ubuntu0.2
released
xenial
Fixed 5.7.3p2-1ubuntu0.1~esm2
released
trusty
needed