Executive Summary

Summary
Title OpenSMTPD vulnerable to local privilege escalation and remote code execution
Informations
Name VU#390745 First vendor Publication 2020-03-09
Vendor VU-CERT Last vendor Modification 2020-03-09
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Overall CVSS Score 9.8
Base Score 9.8 Environmental Score 9.8
impact SubScore 5.9 Temporal Score 9.8
Exploitabality Sub Score 3.9
 
Attack Vector Network Attack Complexity Low
Privileges Required None User Interaction None
Scope Unchanged Confidentiality Impact High
Integrity Impact High Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 10 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

OpenSMTPD is an open-source server-side implementation of the Simple Mail Transfer Protocol(SMTP)that is part of the OpenBSD Project. OpenSMTPD's smtp_mailaddr()function is responsible for validating sender and recipient mail addresses. If the local part of an address is invalid and the domain name is empty,smtp_mailaddr()will automatically add a domain name as opposed to failing because of the invalid local address. This will allow the invalid local address to pass through the function without validation.

Original Source

Url : https://kb.cert.org/vuls/id/390745

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-252 Unchecked Return Value

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1
Os 2

SAINT Exploits

Description Link
OpenSMTPD MAIL FROM command injection More info here

Snort® IPS/IDS

Date Description
2020-04-14 OpenSMTPD smtp_mailaddr command injection attempt
RuleID : 53432 - Revision : 1 - Type : SERVER-MAIL
2020-04-14 OpenSMTPD smtp_mailaddr command injection attempt
RuleID : 53431 - Revision : 1 - Type : SERVER-MAIL

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2020-05-23 13:15:43
  • First insertion