OpenSMTPD before 6.6.4 allows remote code execution because of an out-of-bounds read in mtaio in mtasession.c for multi-line replies. Although this vulnerability affects the client side of OpenSMTPD, it is possible to attack a server because the server code launches the client code during bounce handling.
[
{
"source": "https://github.com/opensmtpd/opensmtpd/commit/555d2121736acdd70453b24b94c8c2996d9ab5f9",
"target": {
"function": "queue_fs_envelope_create",
"file": "smtpd/queue_fs.c"
},
"id": "CVE-2020-8794-7da4040d",
"deprecated": false,
"signature_type": "Function",
"signature_version": "v1",
"digest": {
"function_hash": "196875953881991152077236116624259068501",
"length": 852.0
}
},
{
"source": "https://github.com/opensmtpd/opensmtpd/commit/555d2121736acdd70453b24b94c8c2996d9ab5f9",
"target": {
"file": "smtpd/queue_fs.c"
},
"id": "CVE-2020-8794-8fca902c",
"deprecated": false,
"signature_type": "Line",
"signature_version": "v1",
"digest": {
"line_hashes": [
"242575823212615086944252627364996250139",
"191066550062516158912985716223257094754",
"166787329513173112996708886338970170939",
"256753418468187729585530898156176574718",
"273979709428202467439049274088971250784"
],
"threshold": 0.9
}
}
]