| Vulnerability Name: | CCN-116346 | ||||||
| Published: | 2016-08-23 | ||||||
| Updated: | 2016-08-23 | ||||||
| Summary: | OpenBSD could allow a remote attacker to bypass security restrictions, caused by an initialization error in the RFC822 parser implementation. An attacker could exploit this vulnerability to bypass mail header processing controls on the target system.. | ||||||
| CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N) 4.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)
| ||||||
| CVSS v2 Severity: | 5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
| ||||||
| Vulnerability Consequences: | Bypass Security | ||||||
| References: | Source: CCN Type: OpenBSD Web site OpenBSD 6.0 Source: CCN Type: Security Tracker Web Site OpenBSD SMTP Processing Bug in rfc2822_parser_init() May Let Remote Users Bypass Security Restrictions on the Target System - SecurityTracker Source: XF Type: UNKNOWN openbsd-smtp-sec-bypass(116346) | ||||||
| Vulnerable Configuration: | Configuration CCN 1: Denotes that component is vulnerable | ||||||
| BACK | |||||||