CVE-2020-35679

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

smtpd/table.c in OpenSMTPD before 6.8.0p1 lacks a certain regfree, which might allow attackers to trigger a "very significant" memory leak via messages to an instance that performs many regex lookups.

References

https://github.com/openbsd/src/commit/79a034b4aed29e965f45a13409268290c9910043

https://www.mail-archive.com/[email protected]/msg05188.html

https://poolp.org/posts/2020-12-24/december-2020-opensmtpd-6.8.0p1-released-fixed-several-bugs-proposed-several-diffs-book-is-on-github/

https://lists.fedoraproject.org/archives/list/[email protected]/message/5LKTFBQCHGMVPR4IZWHQIYAPM5J3LN3J/

https://lists.fedoraproject.org/archives/list/[email protected]/message/TYAYXRV2DM5K4RU7RHCDZSA2UF6VCTRC/

https://security.gentoo.org/glsa/202105-12

Details

Source: MITRE

Published: 2020-12-24

Updated: 2021-07-21

Type: CWE-772

Risk Information

CVSS v2

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM

CVSS v3

Base Score: 7.5

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Impact Score: 3.6

Exploitability Score: 3.9

Severity: HIGH

Tenable Plugins

View all (3 total)

IDNameProductFamilySeverity
150009GLSA-202105-12 : OpenSMTPD: Multiple vulnerabilitiesNessusGentoo Local Security Checks
high
145780Fedora 32 : opensmtpd (2021-71fbdecdf8)NessusFedora Local Security Checks
high
145747Fedora 33 : opensmtpd (2021-848fd34b0b)NessusFedora Local Security Checks
high