Ubuntu 6.06 LTS / 8.04 LTS / 9.10 / 10.04 LTS / 10.10 : postfix vulnerabilities (USN-1113-1)

Ubuntu Security Notice (C) 2011-2013 Canonical, Inc. / NASL script (C) 2011-2013 Tenable Network Security, Inc.


Synopsis :

The remote Ubuntu host is missing a security-related patch.

Description :

It was discovered that the Postfix package incorrectly granted write
access on the PID directory to the postfix user. A local attacker
could use this flaw to possibly conduct a symlink attack and overwrite
arbitrary files. This issue only affected Ubuntu 6.06 LTS and 8.04
LTS. (CVE-2009-2939)

Wietse Venema discovered that Postfix incorrectly handled cleartext
commands after TLS is in place. A remote attacker could exploit this
to inject cleartext commands into TLS sessions, and possibly obtain
confidential information such as passwords. (CVE-2011-0411).

Solution :

Update the affected postfix package.

Risk factor :

Medium / CVSS Base Score : 6.9
(CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 5.7
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: Ubuntu Local Security Checks

Nessus Plugin ID: 55071 ()

Bugtraq ID: 36469
46767

CVE ID: CVE-2009-2939
CVE-2011-0411