smtpd/lka_filter.c in OpenSMTPD before 6.8.0p1, in certain configurations, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted pattern of client activity, because the filter state machine does not properly maintain the I/O channel between the SMTP engine and the filters layer.
[
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"146958479146620846539546414962359749417",
"331739472224798831840993251905507474107",
"91893901251692159920292890227734731430",
"279425024596136944150789901713018609996",
"302454195925576915379956718349724179184",
"102226086405913718666762852662536102668",
"156377891668464352413748805278213613186",
"294224973442606065565798747585475670296"
]
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Line",
"id": "CVE-2020-35680-5a2407e5",
"target": {
"file": "usr.sbin/smtpd/lka_filter.c"
},
"source": "https://github.com/openbsd/src/commit/6c3220444ed06b5796dedfd53a0f4becd903c0d1"
},
{
"digest": {
"length": 477.0,
"function_hash": "139574854378595409949297631104406793897"
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Function",
"id": "CVE-2020-35680-e9b83694",
"target": {
"function": "filter_session_io",
"file": "usr.sbin/smtpd/lka_filter.c"
},
"source": "https://github.com/openbsd/src/commit/6c3220444ed06b5796dedfd53a0f4becd903c0d1"
}
]
[
{
"events": [
{
"introduced": "0"
},
{
"fixed": "6.8.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "6.8.0-NA"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "32"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "33"
}
]
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-35680.json"