OpenSMTPD.smtp_session.c.Command.Execution

description-logoDescription

This indicates an attack attempt to exploit an Input Validation Error Vulnerability in OpenSMTPD.
The vulnerability is due to improper validation of sender and recipient mail addresses. Successful exploitation will result in the attacker being able to execute arbitrary shell commands with ROOT privileges.

affected-products-logoAffected Products

OpenSMTPD OpenSMTPD prior to 6.6.2p1

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Apply the most recent upgrade or patch from the vendor.
https://ftp.openbsd.org/pub/OpenBSD/patches/6.6/common/019_smtpd_exec.patch.sig

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2020-10-19 16.945 Sig Added
2020-08-12 15.904 Sig Added
2020-04-06 15.811 Sig Added
2020-02-27 15.785 Default_action:pass:drop
2020-02-18 15.778