Download
| Alert*
oval:org.secpod.oval:def:62013
Qualys discovered that the OpenSMTPD SMTP server performed insufficient validation of SMTP commands, which could result in local privilege escalation or the execution of arbitrary code. oval:org.secpod.oval:def:62034 opensmtpd: secure, reliable, lean, and easy-to configure SMTP server Several security issues were fixed in opensmtpd. oval:org.secpod.oval:def:1801995 OpenSMTPD before 6.6.4 allows remote code execution because of an out-of-bounds read in mta_io in mta_session.c for multi-line replies. Although this vulnerability affects the client side of OpenSMTPD, it is possible to attack a server because the server code launches the client code during bounce h ... oval:org.secpod.oval:def:705399 opensmtpd: secure, reliable, lean, and easy-to configure SMTP server Several security issues were fixed in opensmtpd. oval:org.secpod.oval:def:69958 Qualys discovered that the OpenSMTPD SMTP server performed insufficient validation of SMTP commands, which could result in local privilege escalation or the execution of arbitrary code. oval:org.secpod.oval:def:604763 Qualys discovered that the OpenSMTPD SMTP server performed insufficient validation of SMTP commands, which could result in local privilege escalation or the execution of arbitrary code. |