Lucene search

K
saintSAINT CorporationSAINT:DD48657F11E085D6372745B3F9903EDB
HistoryFeb 10, 2020 - 12:00 a.m.

OpenSMTPD MAIL FROM command injection

2020-02-1000:00:00
SAINT Corporation
my.saintcorporation.com
77

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.975 High

EPSS

Percentile

100.0%

Added: 02/10/2020
CVE: CVE-2020-7247

Background

OpenSMTPD is a free SMTP implementation. It comes with the OpenBSD operating system but is also available for other platforms.

Problem

The **smtp_mailaddr** function does not properly sanitize user input, allowing remote attackers to inject arbitrary commands into the **MAIL FROM** header.

Resolution

Upgrade to OpenSMTPD 6.6.2p1 or higher.

References

<https://www.kb.cert.org/vuls/id/390745/&gt;

Limitations

Exploit works with OpenSMTPD 6.6.0.

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.975 High

EPSS

Percentile

100.0%