Debian DSA-1629-2 : postfix - programming error

Medium Nessus Plugin ID 33934

Synopsis

The remote Debian host is missing a security-related update.

Description

Sebastian Krahmer discovered that Postfix, a mail transfer agent, incorrectly checks the ownership of a mailbox. In some configurations, this allows for appending data to arbitrary files as root.

Note that only specific configurations are vulnerable; the default Debian installation is not affected. Only a configuration meeting the following requirements is vulnerable :

- The mail delivery style is mailbox, with the Postfix built-in local(8) or virtual(8) delivery agents.
- The mail spool directory (/var/spool/mail) is user-writeable.

- The user can create hardlinks pointing to root-owned symlinks located in other directories.

For a detailed treating of the issue, please refer to the upstream author's announcement.

Solution

Upgrade the postfix package.

For the stable distribution (etch), this problem has been fixed in version 2.3.8-2+etch1.

See Also

http://article.gmane.org/gmane.mail.postfix.announce/110

https://www.debian.org/security/2008/dsa-1629

Plugin Details

Severity: Medium

ID: 33934

File Name: debian_DSA-1629.nasl

Version: 1.15

Type: local

Agent: unix

Published: 2008/08/19

Updated: 2019/03/18

Dependencies: 12634

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 6.2

Temporal Score: 4.9

Vector: CVSS2#AV:L/AC:H/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:postfix, cpe:/o:debian:debian_linux:4.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2008/08/19

Vulnerability Publication Date: 2008/08/18

Reference Information

CVE: CVE-2008-2936

BID: 30691

DSA: 1629

CWE: 264