Use-After-Free Vulnerability in OpenSMTPD by OpenBSD
CVE-2015-7687
9.8CRITICAL
Summary
An identified use-after-free vulnerability in OpenSMTPD prior to version 5.7.2 allows remote attackers to exploit this weakness. Attackers can craft specific inputs that leverage the req_ca_vrfy_smtp and req_ca_vrfy_mta functions, which can lead to a denial of service through application crashes or even facilitate the execution of arbitrary code. Given the nature of this flaw, it poses significant risks to systems employing OpenSMTPD, necessitating upgrades to mitigate potential threats.
References
EPSS Score
10% chance of being exploited in the next 30 days.
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved