OpenSMTPD before 6.6.4 allows local users to read arbitrary files (e.g., on some Linux distributions) because of a combination of an untrusted search path in makemap.c and race conditions in the offline functionality in smtpd.c.
The product checks the state of a resource before using that resource, but the resource's state can change between the check and the use in a way that invalidates the results of the check. This can cause the product to perform invalid actions when the resource is in an unexpected state.
Link | Tags |
---|---|
https://www.openbsd.org/security.html | third party advisory |
http://www.openwall.com/lists/oss-security/2020/02/24/4 | mailing list third party advisory exploit |
http://seclists.org/fulldisclosure/2020/Feb/28 | third party advisory mailing list |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPH4QU4DNVHA7ACFXMYFCEP5PSXXPN4E/ | vendor advisory |
https://usn.ubuntu.com/4294-1/ | third party advisory vendor advisory |