Wietse Venema:
> Scott Kitterman:
> > It would be nice to get a read from the Postfix developers if this issue 
> > recently reported to oss-security [1] is relevant to Postfix on systems 
> > with 
> > support for Berkeley DB databases?
> 
> Set-[ug]id privilege escalation with environment settings that
> modify the behavior of a library? Not relevant.

Hmm. this is about a fixed pathname in the current directory.

Postfix daemons run with cwd == /var/spool/postfix which is writable
only by root. So that is safe.

Set-gid Postfix non-daemon programs will eventually chdir() to
/var/spool/postfix, but it is possible that PAM or NSS opens a db
file before that time, or that postdrop or postqueue open a db file
while initializing some main.cf setting.

I guess that means one could trick Berkeley DB into reading a message
file in the maildrop directory, if you know the maildrop file name.
Normally, a maildrop file will be removed quickly by the pickup
dameon, so I don't know how realistic an attack like this would be.

Other Postfix non-daemon programs run with the same privileges as
the process that invokes the command. There is no privilege escalation.

        Wietse

Reply via email to