Описание
OpenSMTPD before 6.6.4 allows remote code execution because of an out-of-bounds read in mta_io in mta_session.c for multi-line replies. Although this vulnerability affects the client side of OpenSMTPD, it is possible to attack a server because the server code launches the client code during bounce handling.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | released | 6.0.3p1-1ubuntu0.2 |
| devel | released | 6.6.4p1-1 |
| eoan | released | 6.0.3p1-6ubuntu0.2 |
| esm-apps/bionic | released | 6.0.3p1-1ubuntu0.2 |
| esm-apps/focal | released | 6.6.4p1-1 |
| esm-apps/jammy | released | 6.6.4p1-1 |
| esm-apps/noble | released | 6.6.4p1-1 |
| esm-apps/xenial | released | 5.7.3p2-1ubuntu0.1~esm2 |
| esm-infra-legacy/trusty | needed | |
| focal | released | 6.6.4p1-1 |
Показывать по
EPSS
10 Critical
CVSS2
9.8 Critical
CVSS3
Связанные уязвимости
OpenSMTPD before 6.6.4 allows remote code execution because of an out-of-bounds read in mta_io in mta_session.c for multi-line replies. Although this vulnerability affects the client side of OpenSMTPD, it is possible to attack a server because the server code launches the client code during bounce handling.
OpenSMTPD before 6.6.4 allows remote code execution because of an out- ...
OpenSMTPD before 6.6.4 allows remote code execution because of an out-of-bounds read in mta_io in mta_session.c for multi-line replies. Although this vulnerability affects the client side of OpenSMTPD, it is possible to attack a server because the server code launches the client code during bounce handling.
Уязвимость реализации функции mta_io (mta_session.c) почтового демона OpenSMTPD, позволяющая нарушителю выполнить произвольный код
EPSS
10 Critical
CVSS2
9.8 Critical
CVSS3