First published: Tue Apr 04 2023(Updated: )
ascii_load_sockaddr in smtpd in OpenBSD before 7.1 errata 024 and 7.2 before errata 020, and OpenSMTPD Portable before 7.0.0-portable commit f748277, can abort upon a connection from a local, scoped IPv6 address.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Opensmtpd Opensmtpd | <7.0.0 | |
Openbsd Openbsd | =7.1 | |
Openbsd Openbsd | =7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-29323 is high with a CVSS score of 7.8.
The affected software for CVE-2023-29323 is OpenSMTPD version up to 7.0.0, OpenBSD 7.1, and OpenBSD 7.2.
The vulnerability in ascii_load_sockaddr in smtpd can be exploited by initiating a connection from a local, scoped IPv6 address.
Yes, the fix for CVE-2023-29323 is available in OpenBSD errata 024 for version 7.1 and in OpenBSD errata 020 for version 7.2, as well as in OpenSMTPD Portable commit f748277 for version 7.0.0.
You can find more information about CVE-2023-29323 at the following references: [link1], [link2], [link3].