You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa OpenSMTPD

Sigurnosni nedostaci programskog paketa OpenSMTPD

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-4294-1
March 02, 2020

OpenSMTPD vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 19.10
– Ubuntu 18.04 LTS

Summary:

Several security issues were fixed in opensmtpd.

Software Description:
– opensmtpd: secure, reliable, lean, and easy-to configure SMTP server

Details:

It was discovered that OpenSMTPD mishandled certain input. A remote,
unauthenticated attacker could use this vulnerability to execute arbitrary
shell commands as any non-root user. (CVE-2020-8794)

It was discovered that OpenSMTPD did not properly handle hardlinks under
certain conditions. An unprivileged local attacker could read the first
line of any file on the filesystem. (CVE-2020-8793)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 19.10:
opensmtpd 6.0.3p1-6ubuntu0.2

Ubuntu 18.04 LTS:
opensmtpd 6.0.3p1-1ubuntu0.2

In general, a standard system update will make all the necessary changes.

References:
https://usn.ubuntu.com/4294-1
CVE-2020-8793, CVE-2020-8794

Package Information:
https://launchpad.net/ubuntu/+source/opensmtpd/6.0.3p1-6ubuntu0.2
https://launchpad.net/ubuntu/+source/opensmtpd/6.0.3p1-1ubuntu0.2

—–BEGIN PGP SIGNATURE—–
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=6pAC
—–END PGP SIGNATURE—–

AutorJosip Papratovic
Cert idNCERT-REF-2020-03-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostaci programskih paketa cacti i cacti-spine

Otkriveni su sigurnosni nedostaci u programskim paketima cacti i cacti-spine za operacijski sustav openSUSE. Otkriveni nedostaci potencijalnim napadačima omogućuju izvršavanje...

Close