Vulnerability Note VU#938323
Postfix local privilege escalation
The Postfix MTA contains a local privilege escalation vulnerability.
Postfix is an mail transport agent (MTA) that is used by several Unix-like operating systems. Symbolic links and hard links are types of files that reference other files. Unlike hard links, symbolic links can point to directories and use relative pathnames.
On some non-POSIX.1-2001 and X/Open XPG4v2 compliant systems, users can hardlink symlinks which are owned by the root user. Postfix allows root-owned symlinks to be used as a mail destination folder. A hard link to a Postfix root-owned symlink could point to a file that can be overwritten by Postfix, regardless of the permissions of the destination file.
A local, authenticated attacker may be able to overwrite arbitrary files, possibly gaining elevated privileges.
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Gentoo Linux||Affected||01 Aug 2008||18 Aug 2008|
|Mandriva, Inc.||Affected||01 Aug 2008||18 Aug 2008|
|SUSE Linux||Affected||01 Aug 2008||18 Aug 2008|
|Ubuntu||Affected||01 Aug 2008||19 Aug 2008|
|DragonFly BSD Project||Not Affected||01 Aug 2008||02 Aug 2008|
|Sun Microsystems, Inc.||Not Affected||01 Aug 2008||19 Aug 2008|
|Apple Computer, Inc.||Unknown||01 Aug 2008||19 Aug 2008|
|Conectiva Inc.||Unknown||01 Aug 2008||01 Aug 2008|
|Cray Inc.||Unknown||01 Aug 2008||01 Aug 2008|
|Debian GNU/Linux||Unknown||01 Aug 2008||01 Aug 2008|
|EMC Corporation||Unknown||01 Aug 2008||01 Aug 2008|
|Engarde Secure Linux||Unknown||01 Aug 2008||01 Aug 2008|
|F5 Networks, Inc.||Unknown||01 Aug 2008||01 Aug 2008|
|Fedora Project||Unknown||01 Aug 2008||01 Aug 2008|
|FreeBSD, Inc.||Unknown||01 Aug 2008||01 Aug 2008|
CVSS Metrics (Learn More)
Thanks to Wietse Venema for information that was used in this report. Sebastian Krahmer of SuSE is credited for discovering and reporting this issue.
This document was written by Ryan Giobbi.
- CVE IDs: CVE-2008-2936
- Date Public: 18 Aug 2008
- Date First Published: 18 Aug 2008
- Date Last Updated: 19 Aug 2008
- Severity Metric: 4.20
- Document Revision: 20
If you have feedback, comments, or additional information about this vulnerability, please send us email.