Open mend-for-github-com[bot] opened 2 years ago
:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
:information_source: This issue was automatically re-opened by Mend because the vulnerable library in the specific branch(es) has been detected in the Mend inventory.
CVE-2020-8793 - Medium Severity Vulnerability
Vulnerable Library - src0aecda14650f9fce8577e43d2a403385b5fa5bcf
Public git conversion mirror of OpenBSD's official CVS src repository. Pull requests not accepted - send diffs to the tech@ mailing list.
Library home page: https://github.com/openbsd/src.git
Vulnerable Source Files (4)
/usr.sbin/smtpd/makemap.c /usr.sbin/smtpd/smtpd-defines.h /usr.sbin/smtpd/makemap.c /usr.sbin/smtpd/smtpd-defines.h
Vulnerability Details
OpenSMTPD before 6.6.4 allows local users to read arbitrary files (e.g., on some Linux distributions) because of a combination of an untrusted search path in makemap.c and race conditions in the offline functionality in smtpd.c.
Publish Date: 2020-02-25
URL: CVE-2020-8793
CVSS 3 Score Details (4.7)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8793
Release Date: 2020-02-25
Fix Resolution: 6.6.4p1