Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2008-2936

Опубликовано: 18 авг. 2008
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 6.2

Описание

Postfix before 2.3.15, 2.4 before 2.4.8, 2.5 before 2.5.4, and 2.6 before 2.6-20080814, when the operating system supports hard links to symlinks, allows local users to append e-mail messages to a file to which a root-owned symlink points, by creating a hard link to this symlink and then sending a message. NOTE: this can be leveraged to gain privileges if there is a symlink to an init script.

РелизСтатусПримечание
dapper

released

2.2.10-1ubuntu0.2
devel

not-affected

feisty

released

2.3.8-2ubuntu0.2
gutsy

released

2.4.5-3ubuntu1.2
hardy

released

2.5.1-2ubuntu1.1
upstream

released

2.5.4

Показывать по

EPSS

Процентиль: 45%
0.00226
Низкий

6.2 Medium

CVSS2

Связанные уязвимости

redhat
почти 17 лет назад

Postfix before 2.3.15, 2.4 before 2.4.8, 2.5 before 2.5.4, and 2.6 before 2.6-20080814, when the operating system supports hard links to symlinks, allows local users to append e-mail messages to a file to which a root-owned symlink points, by creating a hard link to this symlink and then sending a message. NOTE: this can be leveraged to gain privileges if there is a symlink to an init script.

nvd
почти 17 лет назад

Postfix before 2.3.15, 2.4 before 2.4.8, 2.5 before 2.5.4, and 2.6 before 2.6-20080814, when the operating system supports hard links to symlinks, allows local users to append e-mail messages to a file to which a root-owned symlink points, by creating a hard link to this symlink and then sending a message. NOTE: this can be leveraged to gain privileges if there is a symlink to an init script.

debian
почти 17 лет назад

Postfix before 2.3.15, 2.4 before 2.4.8, 2.5 before 2.5.4, and 2.6 bef ...

github
около 3 лет назад

Postfix before 2.3.15, 2.4 before 2.4.8, 2.5 before 2.5.4, and 2.6 before 2.6-20080814, when the operating system supports hard links to symlinks, allows local users to append e-mail messages to a file to which a root-owned symlink points, by creating a hard link to this symlink and then sending a message. NOTE: this can be leveraged to gain privileges if there is a symlink to an init script.

oracle-oval
почти 17 лет назад

ELSA-2008-0839: postfix security update (MODERATE)

EPSS

Процентиль: 45%
0.00226
Низкий

6.2 Medium

CVSS2