OpenSMTPD before 6.6.4 allows local users to read arbitrary files (e.g., on some Linux distributions) because of a combination of an untrusted search path in makemap.c and race conditions in the offline functionality in smtpd.c.
References
Link | Resource |
---|---|
https://www.openbsd.org/security.html | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2020/02/24/4 | Exploit Mailing List Third Party Advisory |
http://seclists.org/fulldisclosure/2020/Feb/28 | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPH4QU4DNVHA7ACFXMYFCEP5PSXXPN4E/ | Mailing List Third Party Advisory |
https://usn.ubuntu.com/4294-1/ | Third Party Advisory |
Information
Published : 2020-02-25 09:15
Updated : 2022-01-01 11:30
NVD link : CVE-2020-8793
Mitre link : CVE-2020-8793
JSON object : View
Products Affected
canonical
- ubuntu_linux
opensmtpd
- opensmtpd
fedoraproject
- fedora