Skip to content

Critical OpenSMTPD Bug Allows Root Shell Access on OpenBSD

OpenBSD users, patch now! Critical bug lets attackers run commands as root. Qualys finds and fixes the issue.

In the image there is a bug on the white surface.
In the image there is a bug on the white surface.

Critical OpenSMTPD Bug Allows Root Shell Access on OpenBSD

OpenBSD users are warned about a critical vulnerability in their OpenSMTPD mail server. Qualys Research Labs discovered the issue, which allows attackers to execute shell commands with root privileges.

The vulnerability, tracked as CVE-2020-7247, exists in the 'smtp_mailaddr()' function of OpenSMTPD and affects OpenBSD version 6.6. Qualys has issued QID 50097 for their Vulnerability Management to help detect the issue.

Qualys researchers used a technique inspired by the Morris Worm to overcome exploitation limitations. Proof-of-concept exploits have been published in the security advisory. An attacker can execute arbitrary shell commands, such as 'sleep 66', with elevated privileges. The OpenBSD project has confirmed the vulnerability and provided a patch for affected users.

OpenBSD users are urged to install the patches for OpenBSD 6.6 to remediate the vulnerability. The patches are available from the OpenBSD project. Failure to patch could leave systems vulnerable to attacks that could execute arbitrary shell commands with root privileges.

Read also:

Latest