OpenSMTPD before 6.6.4 allows remote code execution because of an out-of-bounds read in mtaio in mtasession.c for multi-line replies. Although this vulnerability affects the client side of OpenSMTPD, it is possible to attack a server because the server code launches the client code during bounce handling.
{ "vanir_signatures": [ { "id": "CVE-2020-8794-7da4040d", "deprecated": false, "signature_version": "v1", "signature_type": "Function", "target": { "file": "smtpd/queue_fs.c", "function": "queue_fs_envelope_create" }, "digest": { "length": 852.0, "function_hash": "196875953881991152077236116624259068501" }, "source": "https://github.com/opensmtpd/opensmtpd/commit/555d2121736acdd70453b24b94c8c2996d9ab5f9" }, { "id": "CVE-2020-8794-8fca902c", "deprecated": false, "signature_version": "v1", "signature_type": "Line", "target": { "file": "smtpd/queue_fs.c" }, "digest": { "threshold": 0.9, "line_hashes": [ "242575823212615086944252627364996250139", "191066550062516158912985716223257094754", "166787329513173112996708886338970170939", "256753418468187729585530898156176574718", "273979709428202467439049274088971250784" ] }, "source": "https://github.com/opensmtpd/opensmtpd/commit/555d2121736acdd70453b24b94c8c2996d9ab5f9" } ] }