USN-4875-1

See a problem?
Source
https://ubuntu.com/security/notices/USN-4875-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/USN-4875-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-4875-1
Related
Published
2021-03-15T23:06:41.297094Z
Modified
2021-03-15T23:06:41.297094Z
Summary
opensmtpd vulnerabilities
Details

It was discovered that OpenSMTPD incorrectly verified the sender's or receiver's e-mail addresses under certain conditions. An attacker could possibly use this vulnerability to execute arbitrary commands as root. (CVE-2020-7247)

It was discovered that OpenSMTPD did not properly handle hardlinks under certain conditions. An unprivileged local attacker could possibly use this issue to obtain sensitive information. This issue only affected Ubuntu 16.04 ESM. (CVE-2020-8793)

It was discovered that OpenSMTPD mishandled certain input. A remote, unauthenticated attacker could possibly use this vulnerability to execute arbitrary shell commands as any non-root user. This issue only affected Ubuntu 16.04 ESM. (CVE-2020-8794)

References

Affected packages

Ubuntu:Pro:14.04:LTS / opensmtpd

Package

Name
opensmtpd

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.1p1-1ubuntu0.1~esm1

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "binaries": [
        {
            "opensmtpd": "5.4.1p1-1ubuntu0.1~esm1"
        }
    ]
}

Ubuntu:Pro:16.04:LTS / opensmtpd

Package

Name
opensmtpd

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.7.3p2-1ubuntu0.1~esm2

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "binaries": [
        {
            "opensmtpd": "5.7.3p2-1ubuntu0.1~esm2"
        }
    ]
}