CVE-2020-7247
Publication date 29 January 2020
Last updated 21 August 2024
Ubuntu priority
Cvss 3 Severity Score
smtp_mailaddr in smtp_session.c in OpenSMTPD 6.6, as used in OpenBSD 6.6 and other products, allows remote attackers to execute arbitrary commands as root via a crafted SMTP session, as demonstrated by shell metacharacters in a MAIL FROM field. This affects the "uncommented" default configuration. The issue exists because of an incorrect return value upon failure of input validation.
From the Ubuntu Security Team
It was discovered that OpenSMTPD incorrectly verified the sender's or receiver's e-mail addresses under certain conditions. An attacker could use this vulnerability to execute arbitrary commands as root.
Status
Package | Ubuntu Release | Status |
---|---|---|
opensmtpd | 22.04 LTS jammy |
Not affected
|
20.04 LTS focal |
Not affected
|
|
18.04 LTS bionic |
Fixed 6.0.3p1-1ubuntu0.1
|
|
16.04 LTS xenial |
Fixed 5.7.3p2-1ubuntu0.1~esm1
|
|
14.04 LTS trusty |
Fixed 5.4.1p1-1ubuntu0.1~esm1
|
Get expanded security coverage with Ubuntu Pro
Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.
Get Ubuntu ProSeverity score breakdown
Parameter | Value |
---|---|
Base score | 9.8 · Critical |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-4268-1
- OpenSMTPD vulnerability
- 5 February 2020
- USN-4875-1
- OpenSMTPD vulnerabilities
- 15 March 2021
Other references
- https://www.openwall.com/lists/oss-security/2020/01/28/3
- https://ftp.openbsd.org/pub/OpenBSD/patches/6.6/common/019_smtpd_exec.patch.sig
- https://github.com/OpenSMTPD/OpenSMTPD/commit/be6ef06cba9484d008d9f057e6b25d863cf278ff (opensmtpd-6.4.0)
- http://packetstormsecurity.com/files/156137/OpenBSD-OpenSMTPD-Privilege-Escalation-Code-Execution.html
- http://packetstormsecurity.com/files/156145/OpenSMTPD-6.6.2-Remote-Code-Execution.html
- http://www.openwall.com/lists/oss-security/2020/01/28/3
- https://seclists.org/bugtraq/2020/Jan/51
- https://www.debian.org/security/2020/dsa-4611
- https://www.kb.cert.org/vuls/id/390745
- https://www.openbsd.org/security.html
- https://www.cve.org/CVERecord?id=CVE-2020-7247
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog