Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20090918192516.GE4643@severus.strandboge.com>
Date: Fri, 18 Sep 2009 14:25:16 -0500
From: Jamie Strandboge <jamie@...onical.com>
To: oss-security@...ts.openwall.com
Cc: coley@...us.mitre.org
Subject: Insecure pid directory permissions for postfix on Debian / Ubuntu

Wietse Venema discovered that Debian and Ubuntu set the permissions of
/var/spool/postfix/pid to be postfix:root 0755. This allows the postfix
user to manipulate pid files and overwrite arbitrary files via symlink
attacks. Arbitrary file overwrites are somewhat mitigated when using
chroot, which is the default on Debian and Ubuntu.

Currently supported versions of Debian and Ubuntu that are affected are
(earlier versions are likely affected, but not checked):
Debian: 4.0 (Etch) and later
Ubuntu: 6.06 LTS (Dapper) and later

The patch is attached. This is CVE-2009-2939.

Jamie

-- 
Jamie Strandboge             | http://www.canonical.com

View attachment "postfix.diff" of type "text/x-diff" (473 bytes)

Download attachment "signature.asc" of type "application/pgp-signature" (198 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.