CVE-2008-2936
Published Aug 18, 2008
Last updated a year ago
Overview
- Description
- Postfix before 2.3.15, 2.4 before 2.4.8, 2.5 before 2.5.4, and 2.6 before 2.6-20080814, when the operating system supports hard links to symlinks, allows local users to append e-mail messages to a file to which a root-owned symlink points, by creating a hard link to this symlink and then sending a message. NOTE: this can be leveraged to gain privileges if there is a symlink to an init script.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.2
- Impact score
- 10
- Exploitability score
- 1.9
- Vector string
- AV:L/AC:H/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-264
Evaluator
- Comment
- Please refer to the following links for additional version information (vendor release notes): Postfix 2.3 - ftp://mirrors.loonybin.net/pub/postfix/official/postfix-2.3.15.RELEASE_NOTES Postfix 2.4 - ftp://mirrors.loonybin.net/pub/postfix/official/postfix-2.4.8.RELEASE_NOTES Postfix 2.5 - ftp://mirrors.loonybin.net/pub/postfix/official/postfix-2.5.4.RELEASE_NOTES Postfix 2.6 - ftp://mirrors.loonybin.net/pub/postfix/experimental/postfix-2.6-20080814.RELEASE_NOTES
- Impact
- -
- Solution
- -
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:postfix:postfix:2.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F08A3C19-AEB6-4E0C-A41D-01024DC0A25D" }, { "criteria": "cpe:2.3:a:postfix:postfix:2.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BAE8A81E-3856-4908-B7B7-9CF511CA2A21" }, { "criteria": "cpe:2.3:a:postfix:postfix:2.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7B935272-1EC7-4C70-8299-9DC7594809EE" }, { "criteria": "cpe:2.3:a:postfix:postfix:2.3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1647690F-D015-4DC4-9FB7-F5E9F0C430D9" }, { "criteria": "cpe:2.3:a:postfix:postfix:2.3.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A814997B-A612-493F-AA85-BA5A187A91FA" }, { "criteria": "cpe:2.3:a:postfix:postfix:2.3.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "449E9764-54F4-46F9-9E4D-F2C96EC5F37E" }, { "criteria": "cpe:2.3:a:postfix:postfix:2.3.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DF4A15A5-0994-4A3B-B4CD-1C5D9F411FDE" }, { "criteria": "cpe:2.3:a:postfix:postfix:2.3.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5E3FB858-1B20-450B-9181-A1FE1C2B9DB4" }, { "criteria": "cpe:2.3:a:postfix:postfix:2.3.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C6BBD449-6F03-4EFE-8C87-B5014F0381F5" }, { "criteria": "cpe:2.3:a:postfix:postfix:2.3.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DEBD42EA-B31E-4E37-BF28-FEBB18369A18" }, { "criteria": "cpe:2.3:a:postfix:postfix:2.3.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B92BCC42-6E9F-44CB-A755-004B6DBD9D41" }, { "criteria": "cpe:2.3:a:postfix:postfix:2.3.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1B67A4AE-2C1C-49D6-9F53-05CAB51273E8" }, { "criteria": "cpe:2.3:a:postfix:postfix:2.3.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7A64D948-9441-492F-B9E5-DE5D5A3D7266" }, { "criteria": "cpe:2.3:a:postfix:postfix:2.3.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6D7BCB67-AF9E-4343-827B-D783C71BAF46" }, { "criteria": "cpe:2.3:a:postfix:postfix:2.3.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "265AD494-E5EB-423B-9C20-62BCB1C3B9B5" }, { "criteria": "cpe:2.3:a:postfix:postfix:2.4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A2138A68-3F3D-4C7E-9FEB-2C8A445F2789" }, { "criteria": "cpe:2.3:a:postfix:postfix:2.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ED5E0EB5-ECC6-4573-9EA7-83E5741DA3CD" }, { "criteria": "cpe:2.3:a:postfix:postfix:2.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "790C02A8-95DD-42BE-8A1C-1C6D6DDCC443" }, { "criteria": "cpe:2.3:a:postfix:postfix:2.4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0A0034F2-585D-4A98-8428-996A726712DE" }, { "criteria": "cpe:2.3:a:postfix:postfix:2.4.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F8B162B5-DEF5-46AD-87D1-734B3B637D46" }, { "criteria": "cpe:2.3:a:postfix:postfix:2.4.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0DF3730A-0FFD-4C23-B758-BBA67CC9CD92" }, { "criteria": "cpe:2.3:a:postfix:postfix:2.4.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "10E8E5E2-5674-40D5-AD86-8C4DDB442EE6" }, { "criteria": "cpe:2.3:a:postfix:postfix:2.4.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "690EDC73-47B5-4891-86A5-37B6ED80E145" }, { "criteria": "cpe:2.3:a:postfix:postfix:2.5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CA31260C-1C67-4E76-9F56-2359BFA0B197" }, { "criteria": "cpe:2.3:a:postfix:postfix:2.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "58F1FC50-B6EB-48FD-A2FA-B8BEB05719DD" }, { "criteria": "cpe:2.3:a:postfix:postfix:2.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A1DE90BD-B5F9-4762-B086-130AB04F3CB0" }, { "criteria": "cpe:2.3:a:postfix:postfix:2.5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CCD5258B-C9DE-47BD-9172-27618F220201" }, { "criteria": "cpe:2.3:a:postfix:postfix:2.6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E5B3F710-13EF-4A36-B191-E0FCC1D98E23" } ], "operator": "OR" } ] } ]