Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-35680

Опубликовано: 24 дек. 2020
Источник: debian

Описание

smtpd/lka_filter.c in OpenSMTPD before 6.8.0p1, in certain configurations, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted pattern of client activity, because the filter state machine does not properly maintain the I/O channel between the SMTP engine and the filters layer.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
opensmtpdfixed6.8.0p2-1package
opensmtpdno-dsabusterpackage
opensmtpdnot-affectedstretchpackage

Примечания

  • https://github.com/openbsd/src/commit/6c3220444ed06b5796dedfd53a0f4becd903c0d1

  • https://www.mail-archive.com/misc@opensmtpd.org/msg05188.html

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 5 лет назад

smtpd/lka_filter.c in OpenSMTPD before 6.8.0p1, in certain configurations, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted pattern of client activity, because the filter state machine does not properly maintain the I/O channel between the SMTP engine and the filters layer.

CVSS3: 7.5
nvd
около 5 лет назад

smtpd/lka_filter.c in OpenSMTPD before 6.8.0p1, in certain configurations, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted pattern of client activity, because the filter state machine does not properly maintain the I/O channel between the SMTP engine and the filters layer.

CVSS3: 7.5
github
больше 3 лет назад

smtpd/lka_filter.c in OpenSMTPD before 6.8.0p1, in certain configurations, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted pattern of client activity, because the filter state machine does not properly maintain the I/O channel between the SMTP engine and the filters layer.