TROYANOSYVIRUS
Back to CVEs

CVE-2020-7247

CRITICALCISA KEV
9.8

Description

smtp_mailaddr in smtp_session.c in OpenSMTPD 6.6, as used in OpenBSD 6.6 and other products, allows remote attackers to execute arbitrary commands as root via a crafted SMTP session, as demonstrated by shell metacharacters in a MAIL FROM field. This affects the "uncommented" default configuration. The issue exists because of an incorrect return value upon failure of input validation.

CVE Details

CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published1/29/2020
Last Modified11/7/2025
Sourcekev
Honeypot Sightings0

CISA KEV

VendorOpenBSD
ProductOpenSMTPD
Vulnerability NameOpenSMTPD Remote Code Execution Vulnerability
KEV Date Added2022-03-25
Remediation Due Date2022-04-15
Ransomware UseUnknown

Affected Products

canonical:ubuntu_linuxdebian:debian_linuxfedoraproject:fedoraopenbsd:opensmtpd

Weaknesses (CWE)

CWE-78CWE-755CWE-755

References

http://seclists.org/fulldisclosure/2020/Jan/49(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2020/01/28/3(af854a3a-2127-422b-91ae-364da2661108)
https://seclists.org/bugtraq/2020/Jan/51(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4268-1/(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2020/dsa-4611(af854a3a-2127-422b-91ae-364da2661108)
https://www.kb.cert.org/vuls/id/390745(af854a3a-2127-422b-91ae-364da2661108)
https://www.openbsd.org/security.html(af854a3a-2127-422b-91ae-364da2661108)

IOC Correlations

No correlations recorded

This product uses data from the NVD API but is not endorsed or certified by the NVD.