vendor:
OpenSMTPD
by:
Marco Ivaldi
9.8
CVSS
CRITICAL
Local Privilege Escalation and Remote Code Execution
20
CWE
Product Name: OpenSMTPD
Affected Version From: OpenSMTPD 6.4.0
Affected Version To: OpenSMTPD 6.6.1
Patch Exists: YES
Related CWE: CVE-2020-7247
CPE: a:openbsd:opensmtpd:6.6.1
Other Scripts:
N/A
Platforms Tested: OpenBSD 6.6, Debian GNU/Linux bullseye/sid with opensmtpd 6.6.1p1-1
2020
OpenSMTPD 6.6.1 – Local Privilege Escalation
smtp_mailaddr in smtp_session.c in OpenSMTPD 6.6, as used in OpenBSD 6.6 and other products, allows remote attackers to execute arbitrary commands as root via a crafted SMTP session, as demonstrated by shell metacharacters in a MAIL FROM field. This affects the 'uncommented' default configuration. The issue exists because of an incorrect return value upon failure of input validation.
Mitigation:
Update to the latest version of OpenSMTPD.