smtpd/lka_filter.c in OpenSMTPD before 6.8.0p1, in certain configurations, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted pattern of client activity, because the filter state machine does not properly maintain the I/O channel between the SMTP engine and the filters layer.
[
{
"id": "CVE-2020-35680-5a2407e5",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"146958479146620846539546414962359749417",
"331739472224798831840993251905507474107",
"91893901251692159920292890227734731430",
"279425024596136944150789901713018609996",
"302454195925576915379956718349724179184",
"102226086405913718666762852662536102668",
"156377891668464352413748805278213613186",
"294224973442606065565798747585475670296"
]
},
"deprecated": false,
"source": "https://github.com/openbsd/src/commit/6c3220444ed06b5796dedfd53a0f4becd903c0d1",
"signature_type": "Line",
"target": {
"file": "usr.sbin/smtpd/lka_filter.c"
}
},
{
"id": "CVE-2020-35680-e9b83694",
"signature_version": "v1",
"digest": {
"function_hash": "139574854378595409949297631104406793897",
"length": 477.0
},
"deprecated": false,
"source": "https://github.com/openbsd/src/commit/6c3220444ed06b5796dedfd53a0f4becd903c0d1",
"signature_type": "Function",
"target": {
"file": "usr.sbin/smtpd/lka_filter.c",
"function": "filter_session_io"
}
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-35680.json"