Article 4YKQM Unpleasant vulnerability in OpenSMTPD

Unpleasant vulnerability in OpenSMTPD

by
corbet
from LWN.net on (#4YKQM)
Qualys has put out an advisory regarding a vulnerability in OpenBSD'sOpenSMTPD mail server. It "allows an attacker to execute arbitrary shellcommands, as root: either locally, in OpenSMTPD's default configuration (which listens on the loopback interface and only accepts mail from localhost); or locally and remotely, in OpenSMTPD's 'uncommented' default configuration (which listens on all interfaces and accepts external mail)." OpenBSD users would be well advised to update quickly.
External Content
Source RSS or Atom Feed
Feed Location http://lwn.net/headlines/rss
Feed Title LWN.net
Feed Link https://lwn.net/
Reply 0 comments