SMTP: OpenSMTPD Command Injection
This signature detects attempts to exploit a known vulnerability against OpenSMTPD. A successful attack can lead to arbitrary code execution.
Extended Description
smtp_mailaddr in smtp_session.c in OpenSMTPD 6.6, as used in OpenBSD 6.6 and other products, allows remote attackers to execute arbitrary commands as root via a crafted SMTP session, as demonstrated by shell metacharacters in a MAIL FROM field. This affects the "uncommented" default configuration. The issue exists because of an incorrect return value upon failure of input validation.
Affected Products
Fedoraproject fedora
References
BugTraq: 20200129
CVE: CVE-2020-7247
URL: https://ftp.openbsd.org/pub/openbsd/patches/6.6/common/019_smtpd_exec.patch.sig
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Fedoraproject
Openbsd
Debian
Canonical
10.0