Lucene search

K
freebsdFreeBSD76F1CE19-5749-11EA-BFF8-C85B76CE9B5A
HistoryFeb 24, 2020 - 12:00 a.m.

OpenSMTPd -- Local information disclosure

2020-02-2400:00:00
vuxml.freebsd.org
43

4.7 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N

4.7 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:M/Au:N/C:C/I:N/A:N

Qualys reports:

We discovered a minor vulnerability in OpenSMTPD, OpenBSD’s mail server:
an unprivileged local attacker can read the first line of an arbitrary
file (for example, root’s password hash in /etc/master.passwd) or the
entire contents of another user’s file (if this file and
/var/spool/smtpd/ are on the same filesystem).

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchopensmtpd< 6.6.4,1UNKNOWN

4.7 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N

4.7 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:M/Au:N/C:C/I:N/A:N