// For flags

CVE-2008-3889

Mandriva Linux Security Advisory 2008-190

Severity Score

5.5
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

2
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Postfix 2.4 before 2.4.9, 2.5 before 2.5.5, and 2.6 before 2.6-20080902, when used with the Linux 2.6 kernel, leaks epoll file descriptors during execution of "non-Postfix" commands, which allows local users to cause a denial of service (application slowdown or exit) via a crafted command, as demonstrated by a command in a .forward file.

Postfix versión 2.4 anteriores a la 2.4.9, versión 2.5 anteriores a la 2.5.5 y versión 2.6 anteriores a la 2.6-2000902, cuando se utiliza con el nucleo de Linux versión 2.6, muestra los descriptores del fichero epoll durante la ejecución de comandos que no son Postfix, permite a usuarios locales provocar una denegación de servicio (aplicación más lenta o finalización) mediante un comando especialmente construido, como se ha demostrado por un comando en un fichero .forward.

A memory leak in Postfix might allow local users to cause a Denial of Service. It has been discovered than Postfix leaks an epoll file descriptor when executing external commands, e.g. user-controlled $HOME/.forward or $HOME/.procmailrc files. NOTE: This vulnerability only concerns Postfix instances running on Linux 2.6 kernels. Versions less than 2.4.9 are affected.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2008-09-02 CVE Reserved
  • 2008-09-11 CVE Published
  • 2008-09-16 First Exploit
  • 2024-08-07 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-20: Improper Input Validation
CAPEC
References (23)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Postfix
Search vendor "Postfix"
Postfix
Search vendor "Postfix" for product "Postfix"
2.4
Search vendor "Postfix" for product "Postfix" and version "2.4"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
2.6
Search vendor "Linux" for product "Linux Kernel" and version "2.6"
-
Safe
Postfix
Search vendor "Postfix"
Postfix
Search vendor "Postfix" for product "Postfix"
2.4.0
Search vendor "Postfix" for product "Postfix" and version "2.4.0"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
2.6
Search vendor "Linux" for product "Linux Kernel" and version "2.6"
-
Safe
Postfix
Search vendor "Postfix"
Postfix
Search vendor "Postfix" for product "Postfix"
2.4.1
Search vendor "Postfix" for product "Postfix" and version "2.4.1"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
2.6
Search vendor "Linux" for product "Linux Kernel" and version "2.6"
-
Safe
Postfix
Search vendor "Postfix"
Postfix
Search vendor "Postfix" for product "Postfix"
2.4.2
Search vendor "Postfix" for product "Postfix" and version "2.4.2"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
2.6
Search vendor "Linux" for product "Linux Kernel" and version "2.6"
-
Safe
Postfix
Search vendor "Postfix"
Postfix
Search vendor "Postfix" for product "Postfix"
2.4.3
Search vendor "Postfix" for product "Postfix" and version "2.4.3"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
2.6
Search vendor "Linux" for product "Linux Kernel" and version "2.6"
-
Safe
Postfix
Search vendor "Postfix"
Postfix
Search vendor "Postfix" for product "Postfix"
2.4.4
Search vendor "Postfix" for product "Postfix" and version "2.4.4"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
2.6
Search vendor "Linux" for product "Linux Kernel" and version "2.6"
-
Safe
Postfix
Search vendor "Postfix"
Postfix
Search vendor "Postfix" for product "Postfix"
2.4.5
Search vendor "Postfix" for product "Postfix" and version "2.4.5"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
2.6
Search vendor "Linux" for product "Linux Kernel" and version "2.6"
-
Safe
Postfix
Search vendor "Postfix"
Postfix
Search vendor "Postfix" for product "Postfix"
2.4.6
Search vendor "Postfix" for product "Postfix" and version "2.4.6"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
2.6
Search vendor "Linux" for product "Linux Kernel" and version "2.6"
-
Safe
Postfix
Search vendor "Postfix"
Postfix
Search vendor "Postfix" for product "Postfix"
2.4.7
Search vendor "Postfix" for product "Postfix" and version "2.4.7"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
2.6
Search vendor "Linux" for product "Linux Kernel" and version "2.6"
-
Safe
Postfix
Search vendor "Postfix"
Postfix
Search vendor "Postfix" for product "Postfix"
2.4.8
Search vendor "Postfix" for product "Postfix" and version "2.4.8"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
2.6
Search vendor "Linux" for product "Linux Kernel" and version "2.6"
-
Safe
Postfix
Search vendor "Postfix"
Postfix
Search vendor "Postfix" for product "Postfix"
2.5.1
Search vendor "Postfix" for product "Postfix" and version "2.5.1"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
2.6
Search vendor "Linux" for product "Linux Kernel" and version "2.6"
-
Safe
Postfix
Search vendor "Postfix"
Postfix
Search vendor "Postfix" for product "Postfix"
2.5.2
Search vendor "Postfix" for product "Postfix" and version "2.5.2"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
2.6
Search vendor "Linux" for product "Linux Kernel" and version "2.6"
-
Safe
Postfix
Search vendor "Postfix"
Postfix
Search vendor "Postfix" for product "Postfix"
2.5.3
Search vendor "Postfix" for product "Postfix" and version "2.5.3"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
2.6
Search vendor "Linux" for product "Linux Kernel" and version "2.6"
-
Safe
Postfix
Search vendor "Postfix"
Postfix
Search vendor "Postfix" for product "Postfix"
2.6
Search vendor "Postfix" for product "Postfix" and version "2.6"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
2.6
Search vendor "Linux" for product "Linux Kernel" and version "2.6"
-
Safe