CERT mailing list archives

OpenSMTPD Vulnerability


From: "US-CERT" <US-CERT () ncas us-cert gov>
Date: Mon, 03 Feb 2020 13:18:24 -0600

Cybersecurity and Infrastructure Security Agency Logo

National Cyber Awareness System:



OpenSMTPD Vulnerability [ https://www.us-cert.gov/ncas/current-activity/2020/02/03/opensmtpd-vulnerability ] 02/03/2020 
01:29 PM EST 
Original release date: February 3, 2020

The CERT Coordination Center (CERT/CC) has released information on a vulnerability affecting OpenSMTPD. An attacker 
could exploit this vulnerability to take control of an affected system. OpenSMTPD is an open-source server-side 
implementation of the Simple Mail Transfer Protocol (SMTP) that is part of the OpenBSD Project.

The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review CERT/CCs 
Vulnerability Note VU#390745 [ https://www.kb.cert.org/vuls/id/390745/ ] and apply the necessary updates.

This product is provided subject to this Notification [ https://www.us-cert.gov/privacy/notification ] and this Privacy 
& Use [ https://www.dhs.gov/privacy-policy ] policy.

body { font-size: 1em; font-family: Arial, Verdana, sans-serif; font-weight: normal; font-style: normal; color: 
#333333; } ________________________________________________________________________

A copy of this publication is available at www.us-cert.gov [ https://www.us-cert.gov ]. If you need help or have 
questions, please send an email to info () us-cert gov. Do not reply to this message since this email was sent from a 
notification-only address that is not monitored. To ensure you receive future US-CERT products, please add US-CERT () 
ncas us-cert gov to your address book. 

OTHER RESOURCES: Contact Us [ http://www.us-cert.gov/contact-us/ ] | Security Publications [ 
http://www.us-cert.gov/security-publications ] | Alerts and Tips [ http://www.us-cert.gov/ncas ] | Related Resources [ 
http://www.us-cert.gov/related-resources ]  

STAY CONNECTED: Sign up for email updates [ http://public.govdelivery.com/accounts/USDHSUSCERT/subscriber/new ] 


Current thread: