drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Zwei Probleme in OpenSMTPD
Name: |
Zwei Probleme in OpenSMTPD |
|
ID: |
USN-4294-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 18.04 LTS, Ubuntu 19.10 |
|
Datum: |
Mo, 2. März 2020, 22:36 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8793
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8794 |
|
Applikationen: |
OpenSMTPD |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============3559440338286864202== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="VjRyVsV24YVw25yYquIYQ3lBjUWE80Pqk"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --VjRyVsV24YVw25yYquIYQ3lBjUWE80Pqk Content-Type: multipart/mixed; boundary="h5NBXgRHw1oen7THOVS20pVcF8N1NHuGB"
--h5NBXgRHw1oen7THOVS20pVcF8N1NHuGB Content-Type: text/plain; charset=utf-8 Content-Language: en-U Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-4294-1 March 02, 2020
OpenSMTPD vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 19.10 - Ubuntu 18.04 LTS
Summary:
Several security issues were fixed in opensmtpd.
Software Description: - opensmtpd: secure, reliable, lean, and easy-to configure SMTP server
Details:
It was discovered that OpenSMTPD mishandled certain input. A remote, unauthenticated attacker could use this vulnerability to execute arbitrary shell commands as any non-root user. (CVE-2020-8794)
It was discovered that OpenSMTPD did not properly handle hardlinks under certain conditions. An unprivileged local attacker could read the first line of any file on the filesystem. (CVE-2020-8793)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 19.10: opensmtpd 6.0.3p1-6ubuntu0.2
Ubuntu 18.04 LTS: opensmtpd 6.0.3p1-1ubuntu0.2
In general, a standard system update will make all the necessary changes.
References: https://usn.ubuntu.com/4294-1 CVE-2020-8793, CVE-2020-8794
Package Information: https://launchpad.net/ubuntu/+source/opensmtpd/6.0.3p1-6ubuntu0.2 https://launchpad.net/ubuntu/+source/opensmtpd/6.0.3p1-1ubuntu0.2
--h5NBXgRHw1oen7THOVS20pVcF8N1NHuGB--
--VjRyVsV24YVw25yYquIYQ3lBjUWE80Pqk Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEwZbe96kJeWh2OITRdyg1Qz0oXX0FAl5dU7EACgkQdyg1Qz0o XX3PDA//YA5vYv4CbMub3RNgjdAD5dAsa81H+uLJWjoMkQ3vTDdm9Rzsgg7QFg3K y8WwMbjDhZNgnWuB84eahZAnNCMYBhF4LeEzpiyUppRdi25OgQAvfHM+LOcbL+ef OIRg0pcRMuUwdviAe23uq+3xiWCigsQR40wRfOmMiakfKis/usySvj/Jxre48ipp L0C7IwDmGW1EumbVVgUCYhPzQXMthF9zqgRCDxuHKucJvxXnmGsAubEKI5JYW7+w LjbE2T10+8WtDCpTSC3kDYaxqrjd8GSRMXmMat906BA0/EnxW96awI6khWP5qK62 eLQlE7DJKKGCY83yxP2a5wc9CgAKG0SRl8jX068f1itYGvkVAFoT6NIAZhC8eIps Inigij52LND3O85weLJcdtrn0GYTeFOoyHiBY3pM+WUtAi1/PdWYTkVQUX7QHFqh RNQkB7t7oJb5K5dBAEYMWqeKEvzquBnYK6anyPhZn8Tk8V9Yqxd9tKdP2exxna8q xt3nrG71cTu/+bTod6ciwvbbqm5MiKSHWrxyVVwxcF5UoDECaD8NDcXKxrw6S871 kStwNec57xDb1YUPFiWDhUQu2ZDSVrqs2C1Br4AAWoKxaF87glfS85HLnulJreNf FghTXEUfWAEJE3MKdToiShICa1T+VOX+KFC7mcEHYyv5JIOAmAc= =6pAC -----END PGP SIGNATURE-----
--VjRyVsV24YVw25yYquIYQ3lBjUWE80Pqk--
--===============3559440338286864202== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5 LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj dXJpdHktYW5ub3VuY2UK
--===============3559440338286864202==--
|
|
|
|