Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-8793

Опубликовано: 25 фев. 2020
Источник: debian
EPSS Низкий

Описание

OpenSMTPD before 6.6.4 allows local users to read arbitrary files (e.g., on some Linux distributions) because of a combination of an untrusted search path in makemap.c and race conditions in the offline functionality in smtpd.c.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
opensmtpdfixed6.6.4p1-1package
opensmtpdfixed6.0.3p1-5+deb10u4busterpackage
opensmtpdfixed6.0.2p1-2+deb9u3stretchpackage

Примечания

  • https://www.openwall.com/lists/oss-security/2020/02/24/4

  • https://ftp.openbsd.org/pub/OpenBSD/patches/6.6/common/021_smtpd_envelope.patch.sig

  • https://poolp.org/posts/2020-01-30/opensmtpd-advisory-dissected/

  • Neutralised by kernel hardening

EPSS

Процентиль: 73%
0.00786
Низкий

Связанные уязвимости

CVSS3: 4.7
ubuntu
почти 6 лет назад

OpenSMTPD before 6.6.4 allows local users to read arbitrary files (e.g., on some Linux distributions) because of a combination of an untrusted search path in makemap.c and race conditions in the offline functionality in smtpd.c.

CVSS3: 4.7
nvd
почти 6 лет назад

OpenSMTPD before 6.6.4 allows local users to read arbitrary files (e.g., on some Linux distributions) because of a combination of an untrusted search path in makemap.c and race conditions in the offline functionality in smtpd.c.

github
больше 3 лет назад

OpenSMTPD before 6.6.4 allows local users to read arbitrary files (e.g., on some Linux distributions) because of a combination of an untrusted search path in makemap.c and race conditions in the offline functionality in smtpd.c.

EPSS

Процентиль: 73%
0.00786
Низкий