Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | |||
Test ID: | 1.3.6.1.4.1.25623.1.0.877546 |
Category: | Fedora Local Security Checks |
Title: | Fedora: Security Advisory for opensmtpd (FEDORA-2020-283dc7f094) |
Summary: | The remote host is missing an update for the 'opensmtpd'; package(s) announced via the FEDORA-2020-283dc7f094 advisory. |
Description: | Summary: The remote host is missing an update for the 'opensmtpd' package(s) announced via the FEDORA-2020-283dc7f094 advisory. Vulnerability Insight: OpenSMTPD is a FREE implementation of the server-side SMTP protocol as defined by RFC 5321, with some additional standard extensions. It allows ordinary machines to exchange e-mails with other systems speaking the SMTP protocol. Started out of dissatisfaction with other implementations, OpenSMTPD nowadays is a fairly complete SMTP implementation. OpenSMTPD is primarily developed by Gilles Chehade, Eric Faurot and Charles Longeau, with contributions from various OpenBSD hackers. OpenSMTPD is part of the OpenBSD Project. The software is freely usable and re-usable by everyone under an ISC license. This package uses standard 'alternatives' mechanism, you may call '/usr/sbin/alternatives --set mta /usr/sbin/sendmail.opensmtpd' if you want to switch to OpenSMTPD MTA immediately after install, and '/usr/sbin/alternatives --set mta /usr/sbin/sendmail.sendmail' to revert back to Sendmail as a default mail daemon. Affected Software/OS: 'opensmtpd' package(s) on Fedora 31. Solution: Please install the updated package(s). CVSS Score: 5.0 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N |
Copyright | Copyright (C) 2020 Greenbone Networks GmbH |
This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |