OpenSMTPD.smtp_session.c.Command.Execution
Description
This indicates an attack attempt to exploit an Input Validation Error Vulnerability in OpenSMTPD.
The vulnerability is due to improper validation of sender and recipient mail addresses. Successful exploitation will result in the attacker being able to execute arbitrary shell commands with ROOT privileges.
Affected Products
OpenSMTPD OpenSMTPD prior to 6.6.2p1
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://ftp.openbsd.org/pub/OpenBSD/patches/6.6/common/019_smtpd_exec.patch.sig
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2020-10-19 | 16.945 | Sig Added |
2020-08-12 | 15.904 | Sig Added |
2020-04-06 | 15.811 | Sig Added |
2020-02-27 | 15.785 | Default_action:pass:drop |
2020-02-18 | 15.778 |