漏洞信息详情
OpenSMTPD 代码问题漏洞
漏洞简介
OpenSMTPD 6.6.4之前版本中的makemap.c文件和smtpd.c文件存在安全漏洞。攻击者可借助特制的参数利用该漏洞读取任意文件的第一行。
漏洞公告
目前厂商已发布升级补丁以修复漏洞,详情请关注厂商主页:
https://www.opensmtpd.org/
参考网址
来源:FULLDISC
链接:http://seclists.org/fulldisclosure/2020/Feb/28
来源:MISC
链接:https://www.openbsd.org/security.html
来源:MLIST
链接:http://www.openwall.com/lists/oss-security/2020/02/24/4
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2020-8793
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/OpenSMTPD-file-reading-via-Makemap-Hardlink-31718
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/156533/OpenSMTPD-Local-Information-Disclosure.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.0763/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/156594/Ubuntu-Security-Notice-USN-4294-1.html
来源:www.exploit-db.com
链接:https://www.exploit-db.com/exploits/48139
受影响实体
暂无
补丁
暂无
还没有评论,来说两句吧...