OpenSMTPD security advisory

Number: AV20-025
Date: 29 January 2020

On 28 January 2020 the OpenBSD Project released a security bulletin to address a remote code execution (RCE) vulnerability affecting its OpenSMTPD e-mail server software.  By sending a specially-crafted email to an affected system, a remote actor can execute arbitrary shell commands as Root.

The portable version of OpenSMTPD is also vulnerable to exploitation. This version runs on the following operating systems and has been incorporated into many of them:

• FreeBSD;
• NetBSD;
• DragonFlyBSD;
• Mac OS X; and
• Various other Linux distributions.

Proof of concept exploit code has been published.

The Cyber Centre encourages users and administrators to review the vendor announcement below and obtain an updated version of OpenSMTPD:

https://www.mail-archive.com/misc@opensmtpd.org/msg04850.html

Note to Readers

The Canadian Centre for Cyber Security (Cyber Centre) operates as part of the Communications Security Establishment.  We are Canada’s national authority on cyber security and we lead the government’s response to cyber security events. As Canada's national computer security incident response team, the Cyber Centre works in close collaboration with government departments, critical infrastructure, Canadian businesses and international partners to prepare for, respond to, mitigate, and recover from cyber events. We do this by providing authoritative advice and support, and coordinating information sharing and incident response. The Cyber Centre is outward-facing, welcoming partnerships that help build a stronger, more resilient cyber space in Canada.

Report a problem on this page

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Please select all that apply:

Thank you for your help!

You will not receive a reply. For enquiries, please contact us.

Date modified: