oss-sec mailing list archives

Re: LPE and RCE in OpenSMTPD's default install (CVE-2020-8794)


From: Qualys Security Advisory <qsa () qualys com>
Date: Tue, 25 Feb 2020 03:06:36 -0800

Hi Alexander,

On Tue, Feb 25, 2020 at 12:54:50AM +0500, Alexander E. Patrakov wrote:
Is the hole exploitable in this configuration?

If there is absolutely nothing else in your configuration file, you
should be fine. Still, we recommend that you patch as soon as possible;
just in case we missed an attack vector.

With best regards,

--
the Qualys Security Advisory team


[https://d1dejaj6dcqv24.cloudfront.net/asset/image/email-banner-384-2x.png]<https://www.qualys.com/email-banner>



This message may contain confidential and privileged information. If it has been sent to you in error, please reply to 
advise the sender of the error and then immediately delete it. If you are not the intended recipient, do not read, 
copy, disclose or otherwise use this message. The sender disclaims any liability for such unauthorized use. NOTE that 
all incoming emails sent to Qualys email accounts will be archived and may be scanned by us and/or by external service 
providers to detect and prevent threats to our systems, investigate illegal or inappropriate behavior, and/or eliminate 
unsolicited promotional emails (“spam”). If you have any concerns about this process, please contact us.


Current thread: