First published: Mon Sep 21 2009(Updated: )
The postfix.postinst script in the Debian GNU/Linux and Ubuntu postfix 2.5.5 package grants the postfix user write access to /var/spool/postfix/pid, which might allow local users to conduct symlink attacks that overwrite arbitrary files.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Plone | =2.5.5 | |
Debian | =6.06 | |
Ubuntu Linux | =4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-2939 has a medium severity rating due to the potential for local users to conduct symlink attacks.
To fix CVE-2009-2939, upgrade to a patched version of Postfix or modify permissions to restrict write access for the postfix user.
CVE-2009-2939 affects the Postfix package version 2.5.5 on Debian GNU/Linux and Ubuntu systems.
Exploiting CVE-2009-2939 allows local users to create symlinks that could be used to overwrite arbitrary files.
Yes, CVE-2009-2939 specifically affects Postfix version 2.5.5 in Debian and Ubuntu systems.