Learn about CVE-2020-35680, a vulnerability in OpenSMTPD before 6.8.0p1 allowing remote attackers to cause a denial of service. Find mitigation steps and preventive measures here.
OpenSMTPD before 6.8.0p1 allows remote attackers to cause a denial of service via crafted client activity.
Understanding CVE-2020-35680
OpenSMTPD vulnerability leading to a denial of service due to a NULL pointer dereference and daemon crash.
What is CVE-2020-35680?
OpenSMTPD before version 6.8.0p1 is susceptible to a denial of service attack caused by a specific pattern of client activity.
The Impact of CVE-2020-35680
The vulnerability allows remote attackers to trigger a denial of service by exploiting a flaw in the filter state machine of OpenSMTPD.
Technical Details of CVE-2020-35680
OpenSMTPD vulnerability technical specifics.
Vulnerability Description
The issue arises from smtpd/lka_filter.c in OpenSMTPD before 6.8.0p1, where the filter state machine fails to maintain the I/O channel properly, leading to a NULL pointer dereference and daemon crash.
Affected Systems and Versions
Exploitation Mechanism
Mitigation and Prevention
Protect systems from CVE-2020-35680.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates