{"id":"ALPINE-CVE-2020-7247","details":"smtp_mailaddr in smtp_session.c in OpenSMTPD 6.6, as used in OpenBSD 6.6 and other products, allows remote attackers to execute arbitrary commands as root via a crafted SMTP session, as demonstrated by shell metacharacters in a MAIL FROM field. This affects the \"uncommented\" default configuration. The issue exists because of an incorrect return value upon failure of input validation.","modified":"2026-03-09T01:19:08.385243Z","published":"2020-01-29T16:15:12.897Z","upstream":["CVE-2020-7247"],"references":[{"type":"ADVISORY","url":"https://security.alpinelinux.org/vuln/CVE-2020-7247"}],"affected":[{"package":{"name":"opensmtpd","ecosystem":"Alpine:v3.11","purl":"pkg:apk/alpine/opensmtpd?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.6.2p1-r0"}]}],"versions":["5.7.1p1-r0","5.7.1p1-r1","5.7.1p1-r2","5.7.2p1-r0","5.7.3p1-r0","5.7.3p1-r1","5.7.3p2-r0","5.7.3p2-r1","5.9.2p1-r0","5.9.2p1-r1","5.9.2p1-r2","5.9.2p1-r3","6.0.2p1-r0","6.0.2p1-r1","6.0.2p1-r2","6.0.2p1-r3","6.0.2p1-r4","6.0.2p1-r5","6.0.2p1-r6","6.0.2p1-r7","6.0.2p1-r8","6.0.3p1-r0","6.0.3p1-r1","6.0.3p1-r2","6.0.3p1-r3","6.0.3p1-r4","6.4.2p1-r0","6.4.2p1-r1","6.4.2p1-r2","6.6.1p1-r0","6.6.1p1-r1","6.6.1p1-r2"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2020-7247.json"}},{"package":{"name":"opensmtpd","ecosystem":"Alpine:v3.12","purl":"pkg:apk/alpine/opensmtpd?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.6.2p1-r0"}]}],"versions":["5.7.1p1-r0","5.7.1p1-r1","5.7.1p1-r2","5.7.2p1-r0","5.7.3p1-r0","5.7.3p1-r1","5.7.3p2-r0","5.7.3p2-r1","5.9.2p1-r0","5.9.2p1-r1","5.9.2p1-r2","5.9.2p1-r3","6.0.2p1-r0","6.0.2p1-r1","6.0.2p1-r2","6.0.2p1-r3","6.0.2p1-r4","6.0.2p1-r5","6.0.2p1-r6","6.0.2p1-r7","6.0.2p1-r8","6.0.3p1-r0","6.0.3p1-r1","6.0.3p1-r2","6.0.3p1-r3","6.0.3p1-r4","6.4.2p1-r0","6.4.2p1-r1","6.4.2p1-r2","6.6.1p1-r0","6.6.1p1-r1","6.6.1p1-r2","6.6.1p1-r3"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2020-7247.json"}},{"package":{"name":"opensmtpd","ecosystem":"Alpine:v3.13","purl":"pkg:apk/alpine/opensmtpd?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.6.2p1-r0"}]}],"versions":["5.7.1p1-r0","5.7.1p1-r1","5.7.1p1-r2","5.7.2p1-r0","5.7.3p1-r0","5.7.3p1-r1","5.7.3p2-r0","5.7.3p2-r1","5.9.2p1-r0","5.9.2p1-r1","5.9.2p1-r2","5.9.2p1-r3","6.0.2p1-r0","6.0.2p1-r1","6.0.2p1-r2","6.0.2p1-r3","6.0.2p1-r4","6.0.2p1-r5","6.0.2p1-r6","6.0.2p1-r7","6.0.2p1-r8","6.0.3p1-r0","6.0.3p1-r1","6.0.3p1-r2","6.0.3p1-r3","6.0.3p1-r4","6.4.2p1-r0","6.4.2p1-r1","6.4.2p1-r2","6.6.1p1-r0","6.6.1p1-r1","6.6.1p1-r2","6.6.1p1-r3"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2020-7247.json"}},{"package":{"name":"opensmtpd","ecosystem":"Alpine:v3.14","purl":"pkg:apk/alpine/opensmtpd?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.6.2p1-r0"}]}],"versions":["5.7.1p1-r0","5.7.1p1-r1","5.7.1p1-r2","5.7.2p1-r0","5.7.3p1-r0","5.7.3p1-r1","5.7.3p2-r0","5.7.3p2-r1","5.9.2p1-r0","5.9.2p1-r1","5.9.2p1-r2","5.9.2p1-r3","6.0.2p1-r0","6.0.2p1-r1","6.0.2p1-r2","6.0.2p1-r3","6.0.2p1-r4","6.0.2p1-r5","6.0.2p1-r6","6.0.2p1-r7","6.0.2p1-r8","6.0.3p1-r0","6.0.3p1-r1","6.0.3p1-r2","6.0.3p1-r3","6.0.3p1-r4","6.4.2p1-r0","6.4.2p1-r1","6.4.2p1-r2","6.6.1p1-r0","6.6.1p1-r1","6.6.1p1-r2","6.6.1p1-r3"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2020-7247.json"}},{"package":{"name":"opensmtpd","ecosystem":"Alpine:v3.15","purl":"pkg:apk/alpine/opensmtpd?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.6.2p1-r0"}]}],"versions":["5.7.1p1-r0","5.7.1p1-r1","5.7.1p1-r2","5.7.2p1-r0","5.7.3p1-r0","5.7.3p1-r1","5.7.3p2-r0","5.7.3p2-r1","5.9.2p1-r0","5.9.2p1-r1","5.9.2p1-r2","5.9.2p1-r3","6.0.2p1-r0","6.0.2p1-r1","6.0.2p1-r2","6.0.2p1-r3","6.0.2p1-r4","6.0.2p1-r5","6.0.2p1-r6","6.0.2p1-r7","6.0.2p1-r8","6.0.3p1-r0","6.0.3p1-r1","6.0.3p1-r2","6.0.3p1-r3","6.0.3p1-r4","6.4.2p1-r0","6.4.2p1-r1","6.4.2p1-r2","6.6.1p1-r0","6.6.1p1-r1","6.6.1p1-r2","6.6.1p1-r3"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2020-7247.json"}},{"package":{"name":"opensmtpd","ecosystem":"Alpine:v3.16","purl":"pkg:apk/alpine/opensmtpd?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.6.2p1-r0"}]}],"versions":["5.7.1p1-r0","5.7.1p1-r1","5.7.1p1-r2","5.7.2p1-r0","5.7.3p1-r0","5.7.3p1-r1","5.7.3p2-r0","5.7.3p2-r1","5.9.2p1-r0","5.9.2p1-r1","5.9.2p1-r2","5.9.2p1-r3","6.0.2p1-r0","6.0.2p1-r1","6.0.2p1-r2","6.0.2p1-r3","6.0.2p1-r4","6.0.2p1-r5","6.0.2p1-r6","6.0.2p1-r7","6.0.2p1-r8","6.0.3p1-r0","6.0.3p1-r1","6.0.3p1-r2","6.0.3p1-r3","6.0.3p1-r4","6.4.2p1-r0","6.4.2p1-r1","6.4.2p1-r2","6.6.1p1-r0","6.6.1p1-r1","6.6.1p1-r2","6.6.1p1-r3"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2020-7247.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}