Number: AV20-043
Date: 25 February 2020
On 24 Febuary 2020 the OpenBSD Project released a security bulletin to address a remote code execution (RCE) vulnerability affecting versions 6.6.3p1 and below of its OpenSMTPD e-mail server software. By sending a specially-crafted email to an affected system, a remote actor can execute arbitrary shell commands as Root.
The portable version of OpenSMTPD is also vulnerable to exploitation. This version runs on the following operating systems and has been incorporated into many of them:
• FreeBSD;
• NetBSD;
• DragonFlyBSD;
• Mac OS X; and
• Various other Linux distributions.
The Cyber Centre encourages users and administrators to review the vendor announcement below and obtain an updated version of OpenSMTPD: https://www.mail-archive.com/misc@opensmtpd.org/msg04888.html
Note to Readers
The Canadian Centre for Cyber Security (Cyber Centre) operates as part of the Communications Security Establishment. We are Canada’s national authority on cyber security and we lead the government’s response to cyber security events. As Canada's national computer security incident response team, the Cyber Centre works in close collaboration with government departments, critical infrastructure, Canadian businesses and international partners to prepare for, respond to, mitigate, and recover from cyber events. We do this by providing authoritative advice and support, and coordinating information sharing and incident response. The Cyber Centre is outward-facing, welcoming partnerships that help build a stronger, more resilient cyber space in Canada.