Login
Newsletter
Werbung

Sicherheit: Zwei Probleme in OpenSMTPD
Aktuelle Meldungen Distributionen
Name: Zwei Probleme in OpenSMTPD
ID: USN-4294-1
Distribution: Ubuntu
Plattformen: Ubuntu 18.04 LTS, Ubuntu 19.10
Datum: Mo, 2. März 2020, 22:36
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8793
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8794
Applikationen: OpenSMTPD

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============3559440338286864202==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="VjRyVsV24YVw25yYquIYQ3lBjUWE80Pqk"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--VjRyVsV24YVw25yYquIYQ3lBjUWE80Pqk
Content-Type: multipart/mixed;
boundary="h5NBXgRHw1oen7THOVS20pVcF8N1NHuGB"

--h5NBXgRHw1oen7THOVS20pVcF8N1NHuGB
Content-Type: text/plain; charset=utf-8
Content-Language: en-U
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-4294-1
March 02, 2020

OpenSMTPD vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 19.10
- Ubuntu 18.04 LTS

Summary:

Several security issues were fixed in opensmtpd.

Software Description:
- opensmtpd: secure, reliable, lean, and easy-to configure SMTP server

Details:

It was discovered that OpenSMTPD mishandled certain input. A remote,
unauthenticated attacker could use this vulnerability to execute arbitrary
shell commands as any non-root user. (CVE-2020-8794)

It was discovered that OpenSMTPD did not properly handle hardlinks under
certain conditions. An unprivileged local attacker could read the first
line of any file on the filesystem. (CVE-2020-8793)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 19.10:
opensmtpd 6.0.3p1-6ubuntu0.2

Ubuntu 18.04 LTS:
opensmtpd 6.0.3p1-1ubuntu0.2

In general, a standard system update will make all the necessary changes.

References:
https://usn.ubuntu.com/4294-1
CVE-2020-8793, CVE-2020-8794

Package Information:
https://launchpad.net/ubuntu/+source/opensmtpd/6.0.3p1-6ubuntu0.2
https://launchpad.net/ubuntu/+source/opensmtpd/6.0.3p1-1ubuntu0.2


--h5NBXgRHw1oen7THOVS20pVcF8N1NHuGB--

--VjRyVsV24YVw25yYquIYQ3lBjUWE80Pqk
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
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=6pAC
-----END PGP SIGNATURE-----

--VjRyVsV24YVw25yYquIYQ3lBjUWE80Pqk--


--===============3559440338286864202==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK

--===============3559440338286864202==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung