smtpmailaddr in smtpsession.c in OpenSMTPD 6.6, as used in OpenBSD 6.6 and other products, allows remote attackers to execute arbitrary commands as root via a crafted SMTP session, as demonstrated by shell metacharacters in a MAIL FROM field. This affects the "uncommented" default configuration. The issue exists because of an incorrect return value upon failure of input validation.
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "ubuntu_priority": "high", "binaries": [ { "binary_version": "5.4.1p1-1ubuntu0.1~esm1", "binary_name": "opensmtpd" }, { "binary_version": "5.4.1p1-1ubuntu0.1~esm1", "binary_name": "opensmtpd-dbgsym" } ] }