SB2021012145 - Fedora EPEL 7 update for opensmtpd



SB2021012145 - Fedora EPEL 7 update for opensmtpd

Published: January 21, 2021

Security Bulletin ID SB2021012145
Severity
Medium
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Memory leak (CVE-ID: CVE-2020-35679)

The vulnerability allows a remote attacker to perform DoS attack on the target system.

The vulnerability exists due memory leak in smtpd/table.c when processing messages. A remote attacker can send a specially crafted message and trigger the daemon to perform multiple regex lookups, which in turn will leak memory.


2) NULL pointer dereference (CVE-ID: CVE-2020-35680)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error in smtpd/lka_filter.c in certain configurations. A remote attacker can trigger denial of service conditions via a crafted pattern of client activity, because the filter state machine does not properly maintain the I/O channel between the SMTP engine and the filters layer.


Remediation

Install update from vendor's website.