CVE-2009-2939
Publication date 21 September 2009
Last updated 24 July 2024
Ubuntu priority
The postfix.postinst script in the Debian GNU/Linux and Ubuntu postfix 2.5.5 package grants the postfix user write access to /var/spool/postfix/pid, which might allow local users to conduct symlink attacks that overwrite arbitrary files.
Notes
jdstrand
per Weitse, the symlink attack should not be possible due to defensive programming. A subverted postfix process running as 'postfix' could replace the pid file, which master could then send signals to.
References
Related Ubuntu Security Notices (USN)
- USN-1113-1
- Postfix vulnerabilities
- 18 April 2011