4.7
CVSSv3

CVE-2020-8793

Published: 25/02/2020 Updated: 07/11/2023
CVSS v2 Base Score: 4.7 | Impact Score: 6.9 | Exploitability Score: 3.4
CVSS v3 Base Score: 4.7 | Impact Score: 3.6 | Exploitability Score: 1
VMScore: 475
Vector: AV:L/AC:M/Au:N/C:C/I:N/A:N

Vulnerability Summary

OpenSMTPD prior to 6.6.4 allows local users to read arbitrary files (e.g., on some Linux distributions) because of a combination of an untrusted search path in makemap.c and race conditions in the offline functionality in smtpd.c.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

opensmtpd opensmtpd

fedoraproject fedora 32

canonical ubuntu linux 18.04

canonical ubuntu linux 19.10

Vendor Advisories

Several security issues were fixed in opensmtpd ...

Exploits

# Title: OpenSMTPD 663 - Arbitrary File Read # Date: 2020-02-20 # Author: qualys # Vendor: wwwopensmtpdorg/ # CVE: 2020-8793 /* * Local information disclosure in OpenSMTPD (CVE-2020-8793) * Copyright (C) 2020 Qualys, Inc * * This program is free software: you can redistribute it and/or modify * it under the terms of the GNU Gener ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> Full Disclosure mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Local information disclosure in OpenSMTPD (CVE-2020-8793) <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From: ...
<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Local information disclosure in OpenSMTPD (CVE-2020-8793) <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From: Qualys ...

Github Repositories

Rust port of the /helIsec/OpenSMTPD

OpenSMTPD-RS A mass exploitation tool for CVE 2020-8793 (Rust port) Info It's just a Rust port (made in 2 hours, so not fully tested) Original work can be found here The Shodan API to find vulnerable devices and mass sends a payload to the target To customize the payload : streamwrite(format!("MAIL FROM:&lt;;{};&gt;\r\n", payload)as_bytes())?; Chang