Vulnerability Description
postfix_groups.pl in Postfix 2.5.2 allows local users to overwrite arbitrary files via a symlink attack on the (1) /tmp/postfix_groups.stdout, (2) /tmp/postfix_groups.stderr, and (3) /tmp/postfix_groups.message temporary files. NOTE: the vendor disputes this vulnerability, stating "This is not a real issue ... users would have to edit a script under /usr/lib to enable it.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Postfix | Postfix | 2.5.2 |
Related Weaknesses (CWE)
References
- http://bugs.debian.org/496401
- http://dev.gentoo.org/~rbu/security/debiantemp/postfixExploit
- http://www.openwall.com/lists/oss-security/2008/10/30/2
- https://bugs.gentoo.org/show_bug.cgi?id=235770
- https://bugs.gentoo.org/show_bug.cgi?id=235811
- http://bugs.debian.org/496401
- http://dev.gentoo.org/~rbu/security/debiantemp/postfixExploit
- http://www.openwall.com/lists/oss-security/2008/10/30/2
- https://bugs.gentoo.org/show_bug.cgi?id=235770
- https://bugs.gentoo.org/show_bug.cgi?id=235811
FAQ
What is CVE-2008-4977?
CVE-2008-4977 is a vulnerability with a CVSS score of 6.9 (MEDIUM). postfix_groups.pl in Postfix 2.5.2 allows local users to overwrite arbitrary files via a symlink attack on the (1) /tmp/postfix_groups.stdout, (2) /tmp/postfix_groups.stderr, and (3) /tmp/postfix_grou...
How severe is CVE-2008-4977?
CVE-2008-4977 has been rated MEDIUM with a CVSS base score of 6.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-4977?
Check the references section above for vendor advisories and patch information. Affected products include: Postfix Postfix.