Fedora 30 : opensmtpd (2020-31216ab928)

high Nessus Plugin ID 134250

Language:

Synopsis

The remote Fedora host is missing a security update.

Description

Release 6.6.4p1 (2020-02-24)

---

- An out of bounds read in smtpd allows an attacker to inject arbitrary commands into the envelope file which are then executed as root. Separately, missing privilege revocation in smtpctl allows arbitrary commands to be run with the _smtpq group.

Release 6.6.3p1 (2020-02-10)

---

- Following the 6.6.2p1 release, various improvements were done in OpenBSD -current to mitigate the risk of similar bugs.

Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website.
Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

Solution

Update the affected opensmtpd package.

See Also

https://bodhi.fedoraproject.org/updates/FEDORA-2020-31216ab928

Plugin Details

Severity: High

ID: 134250

File Name: fedora_2020-31216ab928.nasl

Version: 1.1

Type: local

Agent: unix

Published: 3/6/2020

Updated: 3/6/2020

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Vulnerability Information

CPE: p-cpe:/a:fedoraproject:fedora:opensmtpd, cpe:/o:fedoraproject:fedora:30

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list

Patch Publication Date: 3/3/2020

Vulnerability Publication Date: 3/3/2020

Reference Information