[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    [oss-security] Insecure pid directory permissions for postfix on Debian / Ubuntu
From:       Jamie Strandboge <jamie () canonical ! com>
Date:       2009-09-18 19:25:16
Message-ID: 20090918192516.GE4643 () severus ! strandboge ! com
[Download RAW message or body]

[Attachment #2 (multipart/mixed)]


Wietse Venema discovered that Debian and Ubuntu set the permissions of
/var/spool/postfix/pid to be postfix:root 0755. This allows the postfix
user to manipulate pid files and overwrite arbitrary files via symlink
attacks. Arbitrary file overwrites are somewhat mitigated when using
chroot, which is the default on Debian and Ubuntu.

Currently supported versions of Debian and Ubuntu that are affected are
(earlier versions are likely affected, but not checked):
Debian: 4.0 (Etch) and later
Ubuntu: 6.06 LTS (Dapper) and later

The patch is attached. This is CVE-2009-2939.

Jamie

--=20
Jamie Strandboge             | http://www.canonical.com

["postfix.diff" (text/x-diff)]

diff -u postfix-2.5.5/debian/postfix.postinst postfix-2.5.5/debian/postfix.postinst
--- postfix-2.5.5/debian/postfix.postinst
+++ postfix-2.5.5/debian/postfix.postinst
@@ -211,9 +211,8 @@
     fi
 fi
 
-for dir in pid public; do
-    makedir ${dir} postfix:root 755
-done
+makedir pid root:root 755
+makedir public postfix:root 755
 for dir in incoming active bounce defer deferred flush saved corrupt; do
     makedir ${dir} postfix:root 700
     if [ -n "$chat" ]; then

["signature.asc" (application/pgp-signature)]

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic