Vulnerability Name: | CVE-2020-35679 (CCN-193800) | ||||||||||||
Assigned: | 2020-12-23 | ||||||||||||
Published: | 2020-12-23 | ||||||||||||
Updated: | 2022-04-26 | ||||||||||||
Summary: | smtpd/table.c in OpenSMTPD before 6.8.0p1 lacks a certain regfree, which might allow attackers to trigger a "very significant" memory leak via messages to an instance that performs many regex lookups. | ||||||||||||
CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) 6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
| ||||||||||||
Vulnerability Type: | CWE-401 | ||||||||||||
Vulnerability Consequences: | Obtain Information | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2020-35679 Source: XF Type: UNKNOWN opensmtpd-cve202035679-info-disc(193800) Source: CCN Type: src GIT Repository Use regfree after we're done with preg. Source: MISC Type: Patch, Third Party Advisory https://github.com/openbsd/src/commit/79a034b4aed29e965f45a13409268290c9910043 Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2021-848fd34b0b Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2021-71fbdecdf8 Source: MISC Type: Third Party Advisory https://poolp.org/posts/2020-12-24/december-2020-opensmtpd-6.8.0p1-released-fixed-several-bugs-proposed-several-diffs-book-is-on-github/ Source: GENTOO Type: Third Party Advisory GLSA-202105-12 Source: CCN Type: OpenSMTPD Mailing List, Wed, 23 Dec 2020 12:29:44 -0800 OpenSMTPD 6.8.0p1 has just been released Source: MISC Type: Release Notes, Third Party Advisory https://www.mail-archive.com/misc@opensmtpd.org/msg05188.html | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: ![]() | ||||||||||||
BACK |