CVE-2008-2937

Current Description

Postfix 2.5 before 2.5.4 and 2.6 before 2.6-20080814 delivers to a mailbox file even when this file is not owned by the recipient, which allows local users to read e-mail messages by creating a mailbox file corresponding to another user's account name.

Evaluator Description

Please refer to the following links for additional version information (vendor release notes):Postfix 2.5 - ftp://mirrors.loonybin.net/pub/postfix/official/postfix-2.5.4.RELEASE_NOTESPostfix 2.6 - ftp://mirrors.loonybin.net/pub/postfix/experimental/postfix-2.6-20080814.RELEASE_NOTES

Basic Data

PublishedAugust 18, 2008
Last ModifiedOctober 11, 2018
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-200
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:L/AC:M/Au:N/C:P/I:N/A:N
CVSS 2 - Access VectorLOCAL
CVSS 2 - Access ComplexityMEDIUM
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactNONE
CVSS 2 - Base Score1.9
SeverityLOW
Exploitability Score3.4
Impact Score2.9
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationPostfixPostfix2.5.0*******
    2.3ApplicationPostfixPostfix2.5.1*******
    2.3ApplicationPostfixPostfix2.5.2*******
    2.3ApplicationPostfixPostfix2.5.3*******
    2.3ApplicationPostfixPostfix2.6.0*******

Vulnerable Software List

VendorProductVersions
Postfix Postfix 2.5.0, 2.5.1, 2.5.2, 2.5.3, 2.6.0

References

NameSourceURLTags
ftp://ftp.porcupine.org/mirrors/postfix-release/experimental/postfix-2.6-20080814.HISTORYftp://ftp.porcupine.org/mirrors/postfix-release/experimental/postfix-2.6-20080814.HISTORYCONFIRM
ftp://ftp.porcupine.org/mirrors/postfix-release/official/postfix-2.5.4.HISTORYftp://ftp.porcupine.org/mirrors/postfix-release/official/postfix-2.5.4.HISTORYCONFIRM
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705CONFIRM
SUSE-SA:2008:040http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00002.htmlSUSE
31477http://secunia.com/advisories/31477SECUNIA
31485http://secunia.com/advisories/31485SECUNIAVendor Advisory
31500http://secunia.com/advisories/31500SECUNIAPATCH Vendor Advisory
32231http://secunia.com/advisories/32231SECUNIA
GLSA-200808-12http://security.gentoo.org/glsa/glsa-200808-12.xmlGENTOO
http://wiki.rpath.com/Advisories:rPSA-2008-0259http://wiki.rpath.com/Advisories:rPSA-2008-0259CONFIRM
MDVSA-2009:224http://www.mandriva.com/security/advisories?name=MDVSA-2009:224MANDRIVA
RHSA-2011:0422http://www.redhat.com/support/errata/RHSA-2011-0422.htmlREDHAT
20080821 rPSA-2008-0259-1 postfixhttp://www.securityfocus.com/archive/1/495632/100/0/threadedBUGTRAQ
30691http://www.securityfocus.com/bid/30691BIDPATCH
ADV-2008-2385http://www.vupen.com/english/advisories/2008/2385VUPEN
postfix-email-information-disclosure(44461)https://exchange.xforce.ibmcloud.com/vulnerabilities/44461XF
https://issues.rpath.com/browse/RPL-2689https://issues.rpath.com/browse/RPL-2689CONFIRM
FEDORA-2008-8595https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00271.htmlFEDORA
FEDORA-2008-8593https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00287.htmlFEDORA