{"vuid":"VU#938323","idnumber":"938323","name":"Postfix local privilege escalation","keywords":["Postfix","local root privilege escalation","hardlinked symlinks"],"overview":"The Postfix MTA contains a local privilege escalation vulnerability.","clean_desc":"Postfix is an mail transport agent (MTA) that is used by several Unix-like operating systems. Symbolic links and hard links are types of files that reference other files. Unlike hard links, symbolic links can point to directories and use relative pathnames. On some non-POSIX.1-2001 and X/Open XPG4v2 compliant systems, users can hardlink symlinks which are owned by the root user. Postfix allows root-owned symlinks to be used as a mail destination folder. A  hard link to a Postfix root-owned symlink could point to a file that can be overwritten by Postfix, regardless of the permissions of the destination file.","impact":"A local, authenticated attacker may be able to overwrite arbitrary files, possibly gaining elevated privileges.","resolution":"Upgrade\nSee http://article.gmane.org/gmane.mail.postfix.announce/110 for information about obtaining updated software. Users who do not compile Postfix from source should see the systems affected section below for a partial list of affected vendors.","workarounds":"Set mailbox permissions Making the system mail spool direct","sysaffected":"","thanks":"Thanks to Wietse Venema for information that was used in this report. Sebastian Krahmer of SuSE is credited for discovering and reporting this issue.","author":"This document was written by Ryan Giobbi.","public":["ftp://ftp.porcupine.org/mirrors/postfix-release/index/html","http://article.gmane.org/gmane.mail.postfix.announce/110","http://linuxgazette.net/105/pitcher.html","http://en.wikipedia.org/wiki/Hard_links","http://en.wikipedia.org/wiki/Symbolic_link"],"cveids":["CVE-2008-2936"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2020-05-21T16:12:23.299272Z","publicdate":"2008-08-18T00:00:00Z","datefirstpublished":"2008-08-18T19:52:50Z","dateupdated":"2008-08-19T14:52:00Z","revision":20,"vrda_d1_directreport":null,"vrda_d1_population":null,"vrda_d1_impact":null,"cam_widelyknown":null,"cam_exploitation":null,"cam_internetinfrastructure":null,"cam_population":null,"cam_impact":null,"cam_easeofexploitation":null,"cam_attackeraccessrequired":null,"cam_scorecurrent":null,"cam_scorecurrentwidelyknown":null,"cam_scorecurrentwidelyknownexploited":null,"ipprotocol":null,"cvss_accessvector":null,"cvss_accesscomplexity":null,"cvss_authentication":null,"cvss_confidentialityimpact":null,"cvss_integrityimpact":null,"cvss_availabilityimpact":null,"cvss_exploitablity":null,"cvss_remediationlevel":null,"cvss_reportconfidence":null,"cvss_collateraldamagepotential":null,"cvss_targetdistribution":null,"cvss_securityrequirementscr":null,"cvss_securityrequirementsir":null,"cvss_securityrequirementsar":null,"cvss_basescore":"N/A","cvss_basevector":"N/A","cvss_temporalscore":"N/A","cvss_environmentalscore":"N/A","cvss_environmentalvector":"N/A","metric":4.2,"vulnote":null}