Name | CVE-2020-7247 |
Description | smtp_mailaddr in smtp_session.c in OpenSMTPD 6.6, as used in OpenBSD 6.6 and other products, allows remote attackers to execute arbitrary commands as root via a crafted SMTP session, as demonstrated by shell metacharacters in a MAIL FROM field. This affects the "uncommented" default configuration. The issue exists because of an incorrect return value upon failure of input validation. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DSA-4611-1 |
Debian Bugs | 950121 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
opensmtpd (PTS) | stretch (security), stretch (lts), stretch | 6.0.2p1-2+deb9u3 | fixed |
buster (security), buster, buster (lts) | 6.0.3p1-5+deb10u4 | fixed | |
bullseye | 6.8.0p2-3 | fixed | |
bookworm | 6.8.0p2-4 | fixed | |
sid, trixie | 7.5.0p0-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
opensmtpd | source | stretch | 6.0.2p1-2+deb9u2 | DSA-4611-1 | ||
opensmtpd | source | buster | 6.0.3p1-5+deb10u3 | DSA-4611-1 | ||
opensmtpd | source | (unstable) | 6.6.2p1-1 | 950121 |
https://www.openwall.com/lists/oss-security/2020/01/28/3
Fixed by: https://github.com/OpenSMTPD/OpenSMTPD/commit/2afab2297347342f81fa31a75bbbf7dbee614fda
https://ftp.openbsd.org/pub/OpenBSD/patches/6.6/common/019_smtpd_exec.patch.sig
The issue is exploitable after switching "to new grammar", which is included
in portable sync commit:
https://github.com/OpenSMTPD/OpenSMTPD/commit/be6ef06cba9484d008d9f057e6b25d863cf278ff (opensmtpd-6.4.0)