Security News > 2020 > January > Critical OpenSMTPD Bug Opens Linux and OpenBSD Mail Servers to Hackers

Cybersecurity researchers have discovered a new critical vulnerability in the OpenSMTPD email server that could allow remote attackers to take complete control over BSD and many Linux based servers.
OpenSMTPD is an open-source implementation of the server-side SMTP protocol that was initially developed as part of the OpenBSD project but now comes pre-installed on many UNIX-based systems.
"Qualys researchers were able to overcome these limitations using a technique from the Morris Worm by executing the body of the mail as a shell script in Sendmail."
The researchers have also released a proof-of-concept exploit code demonstrating the OpenSMTPD vulnerability.
Qualys responsibly reported the flaw to OpenSMTPD developers, who earlier today released OpenSMTPD version 6.6.2p1 with a patch and also pushed an update for OpenBSD users.
News URL
http://feedproxy.google.com/~r/TheHackersNews/~3/swuZzA5fo2M/openbsd-opensmtpd-hacking.html
Related news
- Hackers Exploit Critical Craft CMS Flaws; Hundreds of Servers Likely Compromised (source)
- Critical FortiSwitch flaw lets hackers change admin passwords remotely (source)
- Critical flaws fixed in Nagios Log Server (source)
- Chinese Hackers Target Linux Systems Using SNOWLIGHT Malware and VShell Tool (source)
- New BPFDoor Controller Enables Stealthy Lateral Movement in Linux Server Attacks (source)
- ASUS releases fix for AMI bug that lets hackers brick servers (source)
- Critical Langflow RCE flaw exploited to hack AI app servers (source)
- Apache Parquet exploit tool detect servers vulnerable to critical flaw (source)
- CISA warns of hackers targeting critical oil infrastructure (source)
- Chinese hackers behind attacks targeting SAP NetWeaver servers (source)