Vulnerability Details CVE-2020-8794
OpenSMTPD before 6.6.4 allows remote code execution because of an out-of-bounds read in mta_io in mta_session.c for multi-line replies. Although this vulnerability affects the client side of OpenSMTPD, it is possible to attack a server because the server code launches the client code during bounce handling.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.868
EPSS Ranking 99.4%
CVSS Severity
CVSS v3 Score 9.8
CVSS v2 Score 10.0
Products affected by CVE-2020-8794
-
cpe:2.3:a:opensmtpd:opensmtpd:5.0
-
cpe:2.3:a:opensmtpd:opensmtpd:5.2.1
-
cpe:2.3:a:opensmtpd:opensmtpd:5.3
-
cpe:2.3:a:opensmtpd:opensmtpd:5.3.1
-
cpe:2.3:a:opensmtpd:opensmtpd:5.3.2
-
cpe:2.3:a:opensmtpd:opensmtpd:5.3.3
-
cpe:2.3:a:opensmtpd:opensmtpd:5.4
-
cpe:2.3:a:opensmtpd:opensmtpd:5.4.1
-
cpe:2.3:a:opensmtpd:opensmtpd:5.4.2
-
cpe:2.3:a:opensmtpd:opensmtpd:5.4.4
-
cpe:2.3:a:opensmtpd:opensmtpd:5.4.5
-
cpe:2.3:a:opensmtpd:opensmtpd:5.4.6
-
cpe:2.3:a:opensmtpd:opensmtpd:5.4.6-2
-
cpe:2.3:a:opensmtpd:opensmtpd:5.7.1
-
cpe:2.3:a:opensmtpd:opensmtpd:5.7.2
-
cpe:2.3:a:opensmtpd:opensmtpd:5.7.3
-
cpe:2.3:a:opensmtpd:opensmtpd:5.9.1
-
cpe:2.3:a:opensmtpd:opensmtpd:5.9.2
-
cpe:2.3:a:opensmtpd:opensmtpd:6.0.0
-
cpe:2.3:a:opensmtpd:opensmtpd:6.0.2
-
cpe:2.3:a:opensmtpd:opensmtpd:6.0.3
-
cpe:2.3:a:opensmtpd:opensmtpd:6.4.0
-
cpe:2.3:a:opensmtpd:opensmtpd:6.4.1
-
cpe:2.3:a:opensmtpd:opensmtpd:6.4.2
-
cpe:2.3:a:opensmtpd:opensmtpd:6.6.0
-
cpe:2.3:a:opensmtpd:opensmtpd:6.6.1
-
cpe:2.3:a:opensmtpd:opensmtpd:6.6.2
-
cpe:2.3:a:opensmtpd:opensmtpd:6.6.3
-
cpe:2.3:o:canonical:ubuntu_linux:18.04
-
cpe:2.3:o:canonical:ubuntu_linux:19.10
-
cpe:2.3:o:debian:debian_linux:10.0
-
cpe:2.3:o:debian:debian_linux:9.0
-
cpe:2.3:o:fedoraproject:fedora:31
-
cpe:2.3:o:fedoraproject:fedora:32