CVE-2020-8794
CRITICALOpenSMTPD OOB Read Local Privilege Escalation
Title source: metasploitDescription
OpenSMTPD before 6.6.4 allows remote code execution because of an out-of-bounds read in mta_io in mta_session.c for multi-line replies. Although this vulnerability affects the client side of OpenSMTPD, it is possible to attack a server because the server code launches the client code during bounce handling.
Exploits (3)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubylocallinux
https://www.exploit-db.com/exploits/48185
metasploit
WORKING POC
NORMAL
by Qualys, wvu · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/local/opensmtpd_oob_read_lpe.rb
exploitdb
WORKING POC
by Qualys Corporation · cremoteopenbsd
https://www.exploit-db.com/exploits/48140
References (11)
Scores
CVSS v3
9.8
EPSS
0.8814
EPSS Percentile
99.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Classification
CWE
CWE-125
Status
published
Affected Products (7)
opensmtpd/opensmtpd
< 6.6.4
canonical/ubuntu_linux
canonical/ubuntu_linux
fedoraproject/fedora
fedoraproject/fedora
debian/debian_linux
debian/debian_linux
Timeline
Published
Feb 25, 2020
Tracked Since
Feb 18, 2026