Lucene search

K
ubuntuUbuntuUSN-636-1
HistoryAug 19, 2008 - 12:00 a.m.

Postfix vulnerability

2008-08-1900:00:00
ubuntu.com
29

6.2 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:H/Au:N/C:C/I:C/A:C

6.1 Medium

AI Score

Confidence

Low

0.0005 Low

EPSS

Percentile

18.1%

Releases

  • Ubuntu 8.04
  • Ubuntu 7.10
  • Ubuntu 7.04
  • Ubuntu 6.06

Packages

  • postfix -

Details

Sebastian Krahmer discovered that Postfix was not correctly handling
mailbox ownership when dealing with Linux’s implementation of hardlinking
to symlinks. In certain mail spool configurations, a local attacker
could exploit this to append data to arbitrary files as the root user.
The default Ubuntu configuration was not vulnerable.

OSVersionArchitecturePackageVersionFilename
Ubuntu8.04noarchpostfix< 2.5.1-2ubuntu1.1UNKNOWN
Ubuntu8.04noarchpostfix-cdb< 2.5.1-2ubuntu1.1UNKNOWN
Ubuntu8.04noarchpostfix-ldap< 2.5.1-2ubuntu1.1UNKNOWN
Ubuntu8.04noarchpostfix-mysql< 2.5.1-2ubuntu1.1UNKNOWN
Ubuntu8.04noarchpostfix-pcre< 2.5.1-2ubuntu1.1UNKNOWN
Ubuntu8.04noarchpostfix-pgsql< 2.5.1-2ubuntu1.1UNKNOWN
Ubuntu7.10noarchpostfix< 2.4.5-3ubuntu1.2UNKNOWN
Ubuntu7.10noarchpostfix-cdb< 2.4.5-3ubuntu1.2UNKNOWN
Ubuntu7.10noarchpostfix-ldap< 2.4.5-3ubuntu1.2UNKNOWN
Ubuntu7.10noarchpostfix-mysql< 2.4.5-3ubuntu1.2UNKNOWN
Rows per page:
1-10 of 231

6.2 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:H/Au:N/C:C/I:C/A:C

6.1 Medium

AI Score

Confidence

Low

0.0005 Low

EPSS

Percentile

18.1%