Vulnerability Name: | CVE-2015-7687 (CCN-106905) | ||||||||||||||||||||||||||||||||||||||||
Assigned: | 2015-10-02 | ||||||||||||||||||||||||||||||||||||||||
Published: | 2015-10-02 | ||||||||||||||||||||||||||||||||||||||||
Updated: | 2017-11-01 | ||||||||||||||||||||||||||||||||||||||||
Summary: | Use-after-free vulnerability in OpenSMTPD before 5.7.2 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via vectors involving req_ca_vrfy_smtp and req_ca_vrfy_mta. | ||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 8.5 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
5.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-416 | ||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2015-7687 Source: FEDORA Type: Third Party Advisory FEDORA-2015-ed1c673f09 Source: FEDORA Type: Third Party Advisory FEDORA-2015-fd133d52cc Source: CCN Type: oss-sec Mailing List, Fri, 2 Oct 2015 07:49:33 -0700 Qualys Security Advisory - OpenSMTPD Audit Report Source: CCN Type: oss-sec Mailing List, Sat, 3 Oct 2015 02:07:08 -0400 (EDT) Re: Qualys Security Advisory - OpenSMTPD Audit Report Source: CCN Type: OpenSMTPD Web site OpenSMTPD Source: MLIST Type: Mailing List, Third Party Advisory, VDB Entry [oss-security] 20151003 Re: Qualys Security Advisory - OpenSMTPD Audit Report Source: BID Type: Third Party Advisory, VDB Entry 76975 Source: CCN Type: Debian Bug report logs - 800787 opensmtpd: CVE-2015-7687 (and other issues without CVE yet) Source: CCN Type: Red Hat Bugzilla Bug 1268793 (CVE-2015-7687) CVE-2015-7687 OpenSMTPD: multiple vulnerabilities fixed in 5.7.2 Source: CONFIRM Type: Issue Tracking, Third Party Advisory, VDB Entry https://bugzilla.redhat.com/show_bug.cgi?id=1268793 Source: XF Type: UNKNOWN opensmtpd-cve20157687-code-exec(106905) Source: CONFIRM Type: Release Notes, Vendor Advisory https://www.opensmtpd.org/announces/release-5.7.2.txt Source: MISC Type: Exploit, Technical Description, Third Party Advisory https://www.qualys.com/2015/10/02/opensmtpd-audit-report.txt | ||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||
BACK |