search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Postfix local privilege escalation

Vulnerability Note VU#938323

Original Release Date: 2008-08-18 | Last Revised: 2008-08-19

Overview

The Postfix MTA contains a local privilege escalation vulnerability.

Description

Postfix is an mail transport agent (MTA) that is used by several Unix-like operating systems. Symbolic links and hard links are types of files that reference other files. Unlike hard links, symbolic links can point to directories and use relative pathnames.

On some non-POSIX.1-2001 and X/Open XPG4v2 compliant systems, users can hardlink symlinks which are owned by the root user. Postfix allows root-owned symlinks to be used as a mail destination folder. A hard link to a Postfix root-owned symlink could point to a file that can be overwritten by Postfix, regardless of the permissions of the destination file.

Impact

A local, authenticated attacker may be able to overwrite arbitrary files, possibly gaining elevated privileges.

Solution

Upgrade
See http://article.gmane.org/gmane.mail.postfix.announce/110 for information about obtaining updated software. Users who do not compile Postfix from source should see the systems affected section below for a partial list of affected vendors.


Set mailbox permissions

Making the system mail spool directory root-owned may mitigate this vulnerability. See http://article.gmane.org/gmane.mail.postfix.announce/110 for specific information about this and other workarounds.

Vendor Information

938323
 

View all 39 vendors View less vendors


CVSS Metrics

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A

References

Acknowledgements

Thanks to Wietse Venema for information that was used in this report. Sebastian Krahmer of SuSE is credited for discovering and reporting this issue.

This document was written by Ryan Giobbi.

Other Information

CVE IDs: CVE-2008-2936
Severity Metric: 4.20
Date Public: 2008-08-18
Date First Published: 2008-08-18
Date Last Updated: 2008-08-19 14:52 UTC
Document Revision: 20

Sponsored by CISA.