Show filters
8 Total Results
Displaying 1-8 of 8
Sort by:
Attacker Value
Unknown
CVE-2020-8794
Disclosure Date: February 25, 2020 (last updated November 08, 2023)
OpenSMTPD before 6.6.4 allows remote code execution because of an out-of-bounds read in mta_io in mta_session.c for multi-line replies. Although this vulnerability affects the client side of OpenSMTPD, it is possible to attack a server because the server code launches the client code during bounce handling.
0
Attacker Value
Very High
CVE-2020-7247
Disclosure Date: January 29, 2020 (last updated November 08, 2023)
smtp_mailaddr in smtp_session.c in OpenSMTPD 6.6, as used in OpenBSD 6.6 and other products, allows remote attackers to execute arbitrary commands as root via a crafted SMTP session, as demonstrated by shell metacharacters in a MAIL FROM field. This affects the "uncommented" default configuration. The issue exists because of an incorrect return value upon failure of input validation.
0
Attacker Value
Unknown
CVE-2023-29323
Disclosure Date: April 04, 2023 (last updated October 08, 2023)
ascii_load_sockaddr in smtpd in OpenBSD before 7.1 errata 024 and 7.2 before errata 020, and OpenSMTPD Portable before 7.0.0-portable commit f748277, can abort upon a connection from a local, scoped IPv6 address.
0
Attacker Value
Unknown
CVE-2020-35679
Disclosure Date: December 24, 2020 (last updated November 08, 2023)
smtpd/table.c in OpenSMTPD before 6.8.0p1 lacks a certain regfree, which might allow attackers to trigger a "very significant" memory leak via messages to an instance that performs many regex lookups.
0
Attacker Value
Unknown
CVE-2020-35680
Disclosure Date: December 24, 2020 (last updated November 08, 2023)
smtpd/lka_filter.c in OpenSMTPD before 6.8.0p1, in certain configurations, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted pattern of client activity, because the filter state machine does not properly maintain the I/O channel between the SMTP engine and the filters layer.
0
Attacker Value
Unknown
CVE-2020-8793
Disclosure Date: February 25, 2020 (last updated November 08, 2023)
OpenSMTPD before 6.6.4 allows local users to read arbitrary files (e.g., on some Linux distributions) because of a combination of an untrusted search path in makemap.c and race conditions in the offline functionality in smtpd.c.
0
Attacker Value
Unknown
CVE-2015-7687
Disclosure Date: October 16, 2017 (last updated November 26, 2024)
Use-after-free vulnerability in OpenSMTPD before 5.7.2 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via vectors involving req_ca_vrfy_smtp and req_ca_vrfy_mta.
0
Attacker Value
Unknown
CVE-2013-2125
Disclosure Date: May 27, 2014 (last updated October 05, 2023)
OpenSMTPD before 5.3.2 does not properly handle SSL sessions, which allows remote attackers to cause a denial of service (connection blocking) by keeping a connection open.
0