Gentoo: Postfix Local privilege escalation


 
Thread Tools Search this Thread
Special Forums Cybersecurity Security Advisories (RSS) Gentoo: Postfix Local privilege escalation
# 1  
Old 08-15-2008
Gentoo: Postfix Local privilege escalation

LinuxSecurity.com: Sebastian Krahmer of SuSE has found that Postfix allows to deliver mail to root-owned symlinks in an insecure manner under certain conditions. Normally, Postfix does not deliver mail to symlinks, except to root-owned symlinks, for compatibility with the systems using symlinks in /dev like Solaris. Furthermore, some systems like Linux allow to hardlink a symlink, while the POSIX.1-2001 standard requires that the symlink is followed.

More...
Login or Register to Ask a Question

Previous Thread | Next Thread
Login or Register to Ask a Question
PMDAPOSTFIX(1)						       Performance Co-Pilot						    PMDAPOSTFIX(1)

NAME
pmdapostfix - Postfix performance metrics domain agent (PMDA) DESCRIPTION
pmdapostfix is a Performance Metrics Domain Agent (PMDA) which exports mail queue sizes as reported by qshape(1), as well as aggregate statistics collected from mail.log. INSTALLATION
If you want access to the names and values for the Postfix performance metrics, do the following as root: # cd $PCP_PMDAS_DIR/postfix # ./Install If you want to undo the installation, do the following as root: # cd $PCP_PMDAS_DIR/postfix # ./Remove pmdapostfix is launched by pmcd(1) and should never be executed directly. The Install and Remove scripts notify pmcd(1) when the agent is installed or removed. FILES
$PCP_PMDAS_DIR/postfix/Install installation script for the pmdapostfix agent $PCP_PMDAS_DIR/postfix/Remove undo installation script for the pmdapostfix agent $PCP_LOG_DIR/pmcd/postfix.log default log file for error messages from pmdapostfix SEE ALSO
pmcd(1) and qshape(1). 3.8.10 Performance Co-Pilot PMDAPOSTFIX(1)