OpenSMTPD before 6.6.4 allows local users to read arbitrary files (e.g., on some Linux distributions) because of a combination of an untrusted search path in makemap.c and race conditions in the offline functionality in smtpd.c.
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2020/Feb/28 | Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2020/02/24/4 | Exploit Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPH4QU4DNVHA7ACFXMYFCEP5PSXXPN4E/ | |
https://usn.ubuntu.com/4294-1/ | Third Party Advisory |
https://www.openbsd.org/security.html | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2020-02-25T16:22:02
Updated: 2020-04-13T22:06:00
Reserved: 2020-02-07T00:00:00
Link: CVE-2020-8793
JSON object: View
NVD Information
Status : Modified
Published: 2020-02-25T17:15:13.103
Modified: 2023-11-07T03:26:45.373
Link: CVE-2020-8793
JSON object: View
Redhat Information
No data.