|
Message-ID: <20090918192516.GE4643@severus.strandboge.com> Date: Fri, 18 Sep 2009 14:25:16 -0500 From: Jamie Strandboge <jamie@...onical.com> To: oss-security@...ts.openwall.com Cc: coley@...us.mitre.org Subject: Insecure pid directory permissions for postfix on Debian / Ubuntu Wietse Venema discovered that Debian and Ubuntu set the permissions of /var/spool/postfix/pid to be postfix:root 0755. This allows the postfix user to manipulate pid files and overwrite arbitrary files via symlink attacks. Arbitrary file overwrites are somewhat mitigated when using chroot, which is the default on Debian and Ubuntu. Currently supported versions of Debian and Ubuntu that are affected are (earlier versions are likely affected, but not checked): Debian: 4.0 (Etch) and later Ubuntu: 6.06 LTS (Dapper) and later The patch is attached. This is CVE-2009-2939. Jamie -- Jamie Strandboge | http://www.canonical.com View attachment "postfix.diff" of type "text/x-diff" (473 bytes) Download attachment "signature.asc" of type "application/pgp-signature" (198 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.