5
CVSSv2

CVE-2020-35680

Published: 24/12/2020 Updated: 07/11/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

smtpd/lka_filter.c in OpenSMTPD prior to 6.8.0p1, in certain configurations, allows remote malicious users to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted pattern of client activity, because the filter state machine does not properly maintain the I/O channel between the SMTP engine and the filters layer.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

opensmtpd opensmtpd 6.8.0

opensmtpd opensmtpd

fedoraproject fedora 32

fedoraproject fedora 33

Vendor Advisories

Debian Bug report logs - #978039 opensmtpd: CVE-2020-35680 Package: src:opensmtpd; Maintainer for src:opensmtpd is Ryan Kavanagh <rak@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Thu, 24 Dec 2020 22:21:01 UTC Severity: important Tags: security, upstream Found in version opensmtpd/680p1~ ...
smtpd/lka_filterc in OpenSMTPD before 680p1, in certain configurations, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted pattern of client activity, because the filter state machine does not properly maintain the I/O channel between the SMTP engine and the filters layer ...