Lucene search

K
archlinuxArchLinuxASA-202101-18
HistoryJan 12, 2021 - 12:00 a.m.

[ASA-202101-18] opensmtpd: multiple issues

2021-01-1200:00:00
security.archlinux.org
80
opensmtpd 6.8.0p2-1 multiple issues information disclosure denial of service memory leak null pointer dereferenc daemon crash cve-2020-35679 cve-2020-35680 remote attack upstream fixed

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.008

Percentile

81.1%

Arch Linux Security Advisory ASA-202101-18

Severity: High
Date : 2021-01-12
CVE-ID : CVE-2020-35679 CVE-2020-35680
Package : opensmtpd
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-1381

Summary

The package opensmtpd before version 6.8.0p2-1 is vulnerable to
multiple issues including information disclosure and denial of service.

Resolution

Upgrade to 6.8.0p2-1.

pacman -Syu “opensmtpd>=6.8.0p2-1”

The problems have been fixed upstream in version 6.8.0p2.

Workaround

None.

Description

  • CVE-2020-35679 (information disclosure)

smtpd/table.c in OpenSMTPD before 6.8.0p1 lacks a certain regfree,
which might allow attackers to trigger a “very significant” memory leak
via messages to an instance that performs many regex lookups.

  • CVE-2020-35680 (denial of service)

smtpd/lka_filter.c in OpenSMTPD before 6.8.0p1, in certain
configurations, allows remote attackers to cause a denial of service
(NULL pointer dereference and daemon crash) via a crafted pattern of
client activity, because the filter state machine does not properly
maintain the I/O channel between the SMTP engine and the filters layer.

Impact

A malicious remote user might read memory or crash the service.

References

https://github.com/openbsd/src/commit/79a034b4aed29e965f45a13409268290c9910043
https://github.com/openbsd/src/commit/6c3220444ed06b5796dedfd53a0f4becd903c0d1
https://security.archlinux.org/CVE-2020-35679
https://security.archlinux.org/CVE-2020-35680

OSVersionArchitecturePackageVersionFilename
ArchLinuxanyanyopensmtpd< 6.8.0p2-1UNKNOWN

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.008

Percentile

81.1%