GLSA Advocate

Joined: 12 May 2004 Posts: 2663
|
Posted: Sun Sep 24, 2017 9:26 pm Post subject: [ GLSA 201709-20 ] Postfix |
|
|
Gentoo Linux Security Advisory
Title: Postfix: Privilege escalation (GLSA 201709-20)
Severity: high
Exploitable: local
Date: 2017-09-24
Bug(s): #621882
ID: 201709-20
Synopsis
A vulnerability in Postfix may allow local users to gain root
privileges.
Background
Postfix is a mail server and an alternative to the widely-used Sendmail
program.
Affected Packages
Package: mail-mta/postfix
Vulnerable: < 3.1.6
Unaffected: >= 3.1.6
Architectures: All supported architectures
Description
By default, Berkeley DB reads a DB_CONFIG configuration file from the
current working directory. This is an undocumented behavior.
Impact
A local attacker, by using a specially crafted DG_CONFIG file, could
possibly escalate privileges to the root group.
Workaround
There is no known workaround at this time.
Resolution
All Postfix users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=mail-mta/postfix-3.1.6"
|
References
Postfix
Official Announce
Last edited by GLSA on Fri Sep 29, 2017 4:17 am; edited 1 time in total |
|