Vulnerabilidad en Denegación de servicio en Postfix 2.4, 2.5 y 2.6 (CVE-2008-3889)
Gravedad CVSS v2.0:
BAJA
Tipo:
CWE-20
Validación incorrecta de entrada
Fecha de publicación:
12/09/2008
Última modificación:
09/04/2025
Descripción
Postfix versión 2.4 anteriores a la 2.4.9, versión 2.5 anteriores a la 2.5.5 y versión 2.6 anteriores a la 2.6-2000902, cuando se utiliza con el nucleo de Linux versión 2.6, muestra los descriptores del fichero epoll durante la ejecución de comandos que no son Postfix, permite a usuarios locales provocar una denegación de servicio (aplicación más lenta o finalización) mediante un comando especialmente construido, como se ha demostrado por un comando en un fichero .forward.
Impacto
Puntuación base 2.0
2.10
Gravedad 2.0
BAJA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:2.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:postfix:postfix:2.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:postfix:postfix:2.4.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:postfix:postfix:2.4.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:postfix:postfix:2.4.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:postfix:postfix:2.4.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:postfix:postfix:2.4.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:postfix:postfix:2.4.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:postfix:postfix:2.4.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:postfix:postfix:2.4.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:postfix:postfix:2.4.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:postfix:postfix:2.5.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:postfix:postfix:2.5.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:postfix:postfix:2.5.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:postfix:postfix:2.6:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00004.html
- http://secunia.com/advisories/31716
- http://secunia.com/advisories/31800
- http://secunia.com/advisories/31982
- http://secunia.com/advisories/31986
- http://secunia.com/advisories/32231
- http://security.gentoo.org/glsa/glsa-200809-09.xml
- http://securityreason.com/securityalert/4239
- http://securitytracker.com/id?1020800=
- http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0311
- http://www.mandriva.com/security/advisories?name=MDVSA-2008%3A190
- http://www.postfix.org/announcements/20080902.html
- http://www.securityfocus.com/archive/1/495894/100/0/threaded
- http://www.securityfocus.com/archive/1/496420/100/0/threaded
- http://www.securityfocus.com/archive/1/498037/100/0/threaded
- http://www.securityfocus.com/bid/30977
- http://www.ubuntu.com/usn/usn-642-1
- http://www.wekk.net/research/CVE-2008-3889/
- https://exchange.xforce.ibmcloud.com/vulnerabilities/44865
- https://www.exploit-db.com/exploits/6472
- https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00271.html
- https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00287.html
- http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00004.html
- http://secunia.com/advisories/31716
- http://secunia.com/advisories/31800
- http://secunia.com/advisories/31982
- http://secunia.com/advisories/31986
- http://secunia.com/advisories/32231
- http://security.gentoo.org/glsa/glsa-200809-09.xml
- http://securityreason.com/securityalert/4239
- http://securitytracker.com/id?1020800=
- http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0311
- http://www.mandriva.com/security/advisories?name=MDVSA-2008%3A190
- http://www.postfix.org/announcements/20080902.html
- http://www.securityfocus.com/archive/1/495894/100/0/threaded
- http://www.securityfocus.com/archive/1/496420/100/0/threaded
- http://www.securityfocus.com/archive/1/498037/100/0/threaded
- http://www.securityfocus.com/bid/30977
- http://www.ubuntu.com/usn/usn-642-1
- http://www.wekk.net/research/CVE-2008-3889/
- https://exchange.xforce.ibmcloud.com/vulnerabilities/44865
- https://www.exploit-db.com/exploits/6472
- https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00271.html
- https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00287.html



