Description
Postfix before 2.3.15, 2.4 before 2.4.8, 2.5 before 2.5.4, and 2.6 before 2.6-20080814, when the operating system supports hard links to symlinks, allows local users to append e-mail messages to a file to which a root-owned symlink points, by creating a hard link to this symlink and then sending a message. NOTE: this can be leveraged to gain privileges if there is a symlink to an init script.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1629-1 | New postfix packages fix privilege escalation |
Debian DSA |
DSA-1629-2 | New postfix packages fix installability problem on i386 |
EUVD |
EUVD-2008-2929 | Postfix before 2.3.15, 2.4 before 2.4.8, 2.5 before 2.5.4, and 2.6 before 2.6-20080814, when the operating system supports hard links to symlinks, allows local users to append e-mail messages to a file to which a root-owned symlink points, by creating a hard link to this symlink and then sending a message. NOTE: this can be leveraged to gain privileges if there is a symlink to an init script. |
Ubuntu USN |
USN-636-1 | Postfix vulnerability |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T09:21:34.272Z
Reserved: 2008-06-30T00:00:00.000Z
Link: CVE-2008-2936
No data.
Status : Modified
Published: 2008-08-18T19:41:00.000
Modified: 2026-04-23T00:35:47.467
Link: CVE-2008-2936
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN