oss-sec mailing list archives
Insecure pid directory permissions for postfix on Debian / Ubuntu
From: Jamie Strandboge <jamie () canonical com>
Date: Fri, 18 Sep 2009 14:25:16 -0500
Wietse Venema discovered that Debian and Ubuntu set the permissions of /var/spool/postfix/pid to be postfix:root 0755. This allows the postfix user to manipulate pid files and overwrite arbitrary files via symlink attacks. Arbitrary file overwrites are somewhat mitigated when using chroot, which is the default on Debian and Ubuntu. Currently supported versions of Debian and Ubuntu that are affected are (earlier versions are likely affected, but not checked): Debian: 4.0 (Etch) and later Ubuntu: 6.06 LTS (Dapper) and later The patch is attached. This is CVE-2009-2939. Jamie -- Jamie Strandboge | http://www.canonical.com
Attachment:
postfix.diff
Description:
Attachment:
signature.asc
Description: Digital signature
Current thread:
- Insecure pid directory permissions for postfix on Debian / Ubuntu Jamie Strandboge (Sep 18)