Postfix before 2.3.15, 2.4 before 2.4.8, 2.5 before 2.5.4, and 2.6 before 2.6-20080814, when the operating system supports hard links to symlinks, allows local users to append e-mail messages to a file to which a root-owned symlink points, by creating a hard link to this symlink and then sending a message. NOTE: this can be leveraged to gain privileges if there is a symlink to an init script.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1629-1 | New postfix packages fix privilege escalation |
Debian DSA |
DSA-1629-2 | New postfix packages fix installability problem on i386 |
EUVD |
EUVD-2008-2929 | Postfix before 2.3.15, 2.4 before 2.4.8, 2.5 before 2.5.4, and 2.6 before 2.6-20080814, when the operating system supports hard links to symlinks, allows local users to append e-mail messages to a file to which a root-owned symlink points, by creating a hard link to this symlink and then sending a message. NOTE: this can be leveraged to gain privileges if there is a symlink to an init script. |
Ubuntu USN |
USN-636-1 | Postfix vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T09:21:34.272Z
Reserved: 2008-06-30T00:00:00
Link: CVE-2008-2936
No data.
Status : Deferred
Published: 2008-08-18T19:41:00.000
Modified: 2025-04-09T00:30:58.490
Link: CVE-2008-2936
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN