漏洞信息详情
OpenSMTPD 缓冲区错误漏洞
漏洞简介
OpenSMTPD 6.6.4之前版本中存在缓冲区错误漏洞,该漏洞源于网络系统或产品在内存上执行操作时,未正确验证数据边界,导致向关联的其他内存位置上执行了错误的读写操作。攻击者可利用该漏洞导致缓冲区溢出或堆溢出等。
漏洞公告
目前厂商已发布升级补丁以修复漏洞,详情请关注厂商主页:
https://www.opensmtpd.org/
参考网址
来源:MISC
链接:https://www.openbsd.org/security.html
来源:MISC
链接:https://www.openwall.com/lists/oss-security/2020/02/24/5
来源:MLIST
链接:http://www.openwall.com/lists/oss-security/2020/03/01/2
来源:MLIST
链接:http://www.openwall.com/lists/oss-security/2020/03/01/1
来源:UBUNTU
链接:https://usn.ubuntu.com/4294-1/
来源:FULLDISC
链接:http://seclists.org/fulldisclosure/2020/Feb/32
来源:MLIST
链接:http://www.openwall.com/lists/oss-security/2021/05/04/7
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/OPH4QU4DNVHA7ACFXMYFCEP5PSXXPN4E/
来源:MLIST
链接:http://www.openwall.com/lists/oss-security/2020/02/26/1
来源:MISC
链接:https://packetstormsecurity.com/files/156633/OpenSMTPD-Out-Of-Bounds-Read-Local-Privilege-Escalation.html
来源:DEBIAN
链接:https://www.debian.org/security/2020/dsa-4634
来源:www.nsfocus.net
链接:http://www.nsfocus.net/vulndb/45971
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2020-8794
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/156534/OpenSMTPD-Out-Of-Bounds-Read.html
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/OpenSMTPD-code-execution-via-Multi-line-Response-31668
来源:www.exploit-db.com
链接:https://www.exploit-db.com/exploits/48140
来源:www.exploit-db.com
链接:https://www.exploit-db.com/exploits/48185
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/156633/OpenSMTPD-Out-Of-Bounds-Read-Local-Privilege-Escalation.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.0702/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.0763/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/156594/Ubuntu-Security-Notice-USN-4294-1.html
受影响实体
暂无
补丁
- OpenSMTPD 缓冲区错误漏洞的修复措施<!--2020-2-25-->
还没有评论,来说两句吧...