logo
Vulnerability feed
CONTRIBUTE

Vulnerability

warn

CVE-2020-8794

Reference to the description:

https://nvd.nist.gov/vuln/detail/CVE-2020-8794

Description:
OpenSMTPD before 6.6.4 allows remote code execution because of an out-of-bounds read in mta_io in mta_session.c for multi-line replies. Although this vulnerability affects the client side of OpenSMTPD, it is possible to attack a server because the server code launches the client code during bounce handling.
Last updated date:
10/08/2022
Type:
exploit
Confidence:
HIGH
Date of publishing:
02/17/2021
Reference url to background

https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/local/opensmtpd_oob_read_lpe.rb

Type:
exploit
Confidence:
HIGH
Date of publishing:
05/04/2021
Type:
exploit
Confidence:
HIGH
Date of publishing:
10/08/2022
Type:
exploit
Confidence:
HIGH
Date of publishing:
10/08/2022
Type:
exploit
Confidence:
HIGH
Date of publishing:
10/08/2022
Vulnerability FeedContributorsAboutBlog

@inTheWild

©2024

Privacy Policy