Subscribe via feed.

OpenSMTPD Local Information Disclosure

Posted by deepcore on February 26, 2020 – 7:48 am

Qualys discovered a minor vulnerability in OpenSMTPD, OpenBSD’s mail server. An unprivileged local attacker can read the first line of an arbitrary file (for example, root’s password hash in /etc/master.passwd) or the entire contents of another user’s file (if this file and /var/spool/smtpd/ are on the same filesystem). A proof of concept exploit is included in this archive.


This post is under “exploit” and has no respond so far.
If you enjoy this article, make sure you subscribe to my RSS Feed.

Post a reply

You must be logged in to post a comment.