Lucene search

K
ubuntuUbuntuUSN-1113-1
HistoryApr 18, 2011 - 12:00 a.m.

Postfix vulnerabilities

2011-04-1800:00:00
ubuntu.com
50

9.7 High

AI Score

Confidence

High

6.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

0.011 Low

EPSS

Percentile

84.5%

Releases

  • Ubuntu 10.10
  • Ubuntu 10.04
  • Ubuntu 9.10
  • Ubuntu 8.04
  • Ubuntu 6.06

Packages

  • postfix - High-performance mail transport agent

Details

It was discovered that the Postfix package incorrectly granted write access
on the PID directory to the postfix user. A local attacker could use this
flaw to possibly conduct a symlink attack and overwrite arbitrary files.
This issue only affected Ubuntu 6.06 LTS and 8.04 LTS. (CVE-2009-2939)

Wietse Venema discovered that Postfix incorrectly handled cleartext
commands after TLS is in place. A remote attacker could exploit this to
inject cleartext commands into TLS sessions, and possibly obtain
confidential information such as passwords. (CVE-2011-0411)

OSVersionArchitecturePackageVersionFilename
Ubuntu9.10noarchpostfix< 2.6.5-3ubuntu0.1UNKNOWN
Ubuntu9.10noarchpostfix-cdb< 2.6.5-3ubuntu0.1UNKNOWN
Ubuntu9.10noarchpostfix-ldap< 2.6.5-3ubuntu0.1UNKNOWN
Ubuntu9.10noarchpostfix-mysql< 2.6.5-3ubuntu0.1UNKNOWN
Ubuntu9.10noarchpostfix-pcre< 2.6.5-3ubuntu0.1UNKNOWN
Ubuntu9.10noarchpostfix-pgsql< 2.6.5-3ubuntu0.1UNKNOWN
Ubuntu8.04noarchpostfix< 2.5.1-2ubuntu1.3UNKNOWN
Ubuntu8.04noarchpostfix-cdb< 2.5.1-2ubuntu1.3UNKNOWN
Ubuntu8.04noarchpostfix-ldap< 2.5.1-2ubuntu1.3UNKNOWN
Ubuntu8.04noarchpostfix-mysql< 2.5.1-2ubuntu1.3UNKNOWN
Rows per page:
1-10 of 291

9.7 High

AI Score

Confidence

High

6.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

0.011 Low

EPSS

Percentile

84.5%