Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2020.0763 USN-4294-1: OpenSMTPD vulnerabilities 3 March 2020 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: OpenSMTPD Publisher: Ubuntu Operating System: Ubuntu Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated Increased Privileges -- Remote/Unauthenticated Access Confidential Data -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2020-8794 CVE-2020-8793 Reference: ESB-2020.0702 Original Bulletin: https://usn.ubuntu.com/4294-1/ - --------------------------BEGIN INCLUDED TEXT-------------------- USN-4294-1: OpenSMTPD vulnerabilities 2 March 2020 OpenSMTPD vulnerabilities A security issue affects these releases of Ubuntu and its derivatives: o Ubuntu 19.10 o Ubuntu 18.04 LTS Summary Several security issues were fixed in opensmtpd. Software Description o opensmtpd - secure, reliable, lean, and easy-to configure SMTP server Details It was discovered that OpenSMTPD mishandled certain input. A remote, unauthenticated attacker could use this vulnerability to execute arbitrary shell commands as any non-root user. (CVE-2020-8794) It was discovered that OpenSMTPD did not properly handle hardlinks under certain conditions. An unprivileged local attacker could read the first line of any file on the filesystem. (CVE-2020-8793) Update instructions The problem can be corrected by updating your system to the following package versions: Ubuntu 19.10 opensmtpd - 6.0.3p1-6ubuntu0.2 Ubuntu 18.04 LTS opensmtpd - 6.0.3p1-1ubuntu0.2 To update your system, please follow these instructions: https:// wiki.ubuntu.com/Security/Upgrades . In general, a standard system update will make all the necessary changes. References o CVE-2020-8793 o CVE-2020-8794 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXl2Zy2aOgq3Tt24GAQh5+BAAqy2D4MQMu4CgAuQ2ZVPC46TDogZro3qe vYrhjEDNL2cfFI5UiHDUAhcd87CK468jXQwYjDoDvd2DqlVNwFJZa4UwVL8OOm8U h5cwbChujIXaoretDUBGpw1TUWqE7u9gEIIvy1+faxa7Cc7APPS4qACziV55mvwa YeopN/KJnJfhnPENId3fqdE9/mgZED4Vw+ISQ654uf6ohAtzpZZvcFRbiA7XxUCi fXRPKYzokMVIzb/triHFl/lU6jVaeajrc8c0FD+ryNBikFJfEalPVP4lI9+USTki I3QeayPce+Zjr8+ghiQPy8xbQogDXB9Qr51tes/lLDddVrZRJrsJHduSYq7ksbvR fzVWnjwUjr5IT5ElVoh0+wLWrXjKJm6aBxJqxFCXJr4ndgkjPDsfHbdUPFaWElUM Ola0PWc4QkzVdqqbWiCeBrmN+fwtiF4B3FghaKBU/CSIyK1tTP0cFGFX1RuQEFdr Z2gkfoPeT4BJCMYhJhP4FHZNROMi1l6TI5hj70Wc1VENVgEcPqoMHzD0lq4XcVtU XqCmJ5305F4IhYfjUH0aSTaHUDER15sAst/bzie84sZ75a4wPtzUtTULDIk4edt5 UQFJbcM8VEA7xBaKnxL+/ZXUcU0ulhRNIPjRtnnr0m7hujS5S0DyA2PlHDEuKWAl P6fSvGhMwDw= =ztAg -----END PGP SIGNATURE-----