CVE-2008-3889
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
12/09/2008
Last modified:
09/04/2025
Description
Postfix 2.4 before 2.4.9, 2.5 before 2.5.5, and 2.6 before 2.6-20080902, when used with the Linux 2.6 kernel, leaks epoll file descriptors during execution of "non-Postfix" commands, which allows local users to cause a denial of service (application slowdown or exit) via a crafted command, as demonstrated by a command in a .forward file.
Impact
Base Score 2.0
2.10
Severity 2.0
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:2.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:postfix:postfix:2.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:postfix:postfix:2.4.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:postfix:postfix:2.4.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:postfix:postfix:2.4.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:postfix:postfix:2.4.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:postfix:postfix:2.4.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:postfix:postfix:2.4.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:postfix:postfix:2.4.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:postfix:postfix:2.4.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:postfix:postfix:2.4.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:postfix:postfix:2.5.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:postfix:postfix:2.5.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:postfix:postfix:2.5.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:postfix:postfix:2.6:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00004.html
- http://secunia.com/advisories/31716
- http://secunia.com/advisories/31800
- http://secunia.com/advisories/31982
- http://secunia.com/advisories/31986
- http://secunia.com/advisories/32231
- http://security.gentoo.org/glsa/glsa-200809-09.xml
- http://securityreason.com/securityalert/4239
- http://securitytracker.com/id?1020800=
- http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0311
- http://www.mandriva.com/security/advisories?name=MDVSA-2008%3A190
- http://www.postfix.org/announcements/20080902.html
- http://www.securityfocus.com/archive/1/495894/100/0/threaded
- http://www.securityfocus.com/archive/1/496420/100/0/threaded
- http://www.securityfocus.com/archive/1/498037/100/0/threaded
- http://www.securityfocus.com/bid/30977
- http://www.ubuntu.com/usn/usn-642-1
- http://www.wekk.net/research/CVE-2008-3889/
- https://exchange.xforce.ibmcloud.com/vulnerabilities/44865
- https://www.exploit-db.com/exploits/6472
- https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00271.html
- https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00287.html
- http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00004.html
- http://secunia.com/advisories/31716
- http://secunia.com/advisories/31800
- http://secunia.com/advisories/31982
- http://secunia.com/advisories/31986
- http://secunia.com/advisories/32231
- http://security.gentoo.org/glsa/glsa-200809-09.xml
- http://securityreason.com/securityalert/4239
- http://securitytracker.com/id?1020800=
- http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0311
- http://www.mandriva.com/security/advisories?name=MDVSA-2008%3A190
- http://www.postfix.org/announcements/20080902.html
- http://www.securityfocus.com/archive/1/495894/100/0/threaded
- http://www.securityfocus.com/archive/1/496420/100/0/threaded
- http://www.securityfocus.com/archive/1/498037/100/0/threaded
- http://www.securityfocus.com/bid/30977
- http://www.ubuntu.com/usn/usn-642-1
- http://www.wekk.net/research/CVE-2008-3889/
- https://exchange.xforce.ibmcloud.com/vulnerabilities/44865
- https://www.exploit-db.com/exploits/6472
- https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00271.html
- https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00287.html



