CVE-2020-7247
Published: 29 January 2020
smtp_mailaddr in smtp_session.c in OpenSMTPD 6.6, as used in OpenBSD 6.6 and other products, allows remote attackers to execute arbitrary commands as root via a crafted SMTP session, as demonstrated by shell metacharacters in a MAIL FROM field. This affects the "uncommented" default configuration. The issue exists because of an incorrect return value upon failure of input validation.
From the Ubuntu Security Team
It was discovered that OpenSMTPD incorrectly verified the sender's or receiver's e-mail addresses under certain conditions. An attacker could use this vulnerability to execute arbitrary commands as root.
Priority
Status
Package | Release | Status |
---|---|---|
opensmtpd Launchpad, Ubuntu, Debian |
bionic |
Released
(6.0.3p1-1ubuntu0.1)
|
eoan |
Released
(6.0.3p1-6ubuntu0.1)
|
|
focal |
Not vulnerable
(6.6.2p1-1)
|
|
impish |
Not vulnerable
(6.6.2p1-1)
|
|
jammy |
Not vulnerable
(6.6.2p1-1)
|
|
trusty |
Released
(5.4.1p1-1ubuntu0.1~esm1)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only) |
|
upstream |
Released
(6.6.2p1-1)
|
|
xenial |
Released
(5.7.3p2-1ubuntu0.1~esm1)
Available with Ubuntu Pro |
|
groovy |
Not vulnerable
(6.6.2p1-1)
|
|
hirsute |
Not vulnerable
(6.6.2p1-1)
|
|
Patches: upstream: https://github.com/openbsd/src/commit/9dcfda045474d8903224d175907bfc29761dcb45 |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 9.8 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7247
- https://www.openwall.com/lists/oss-security/2020/01/28/3
- https://ftp.openbsd.org/pub/OpenBSD/patches/6.6/common/019_smtpd_exec.patch.sig
- https://github.com/OpenSMTPD/OpenSMTPD/commit/be6ef06cba9484d008d9f057e6b25d863cf278ff (opensmtpd-6.4.0)
- http://packetstormsecurity.com/files/156137/OpenBSD-OpenSMTPD-Privilege-Escalation-Code-Execution.html
- http://packetstormsecurity.com/files/156145/OpenSMTPD-6.6.2-Remote-Code-Execution.html
- http://www.openwall.com/lists/oss-security/2020/01/28/3
- https://seclists.org/bugtraq/2020/Jan/51
- https://www.debian.org/security/2020/dsa-4611
- https://www.kb.cert.org/vuls/id/390745
- https://www.openbsd.org/security.html
- https://ubuntu.com/security/notices/USN-4268-1
- NVD
- Launchpad
- Debian