Description
getmail 4.x before 4.2.0, and other versions before 3.2.5, when run as root, allows local users to write files in arbitrary directories via a symlink attack on subdirectories in the maildir.
Product(s):
- getmail 2.3.7
- getmail 3.x
- Getmail 4.0.0_b10
- Getmail 4.0.10
- Getmail 4.0.11
- Getmail 4.0.12
- Getmail 4.0.13
- Getmail 4.0.1
- Getmail 4.0.2
- Getmail 4.0.3
- Getmail 4.0.4
- Getmail 4.0.5
- getmail 4.0.6
- getmail 4.0.7
- getmail 4.0.8
- getmail 4.0.9
- getmail 4.0
- getmail 4.1.1
- getmail 4.1.2
- getmail 4.1.3
- getmail 4.1.4
- getmail 4.1.5
- getmail 4.1
- Gentoo Linux 1.4
- Gentoo Linux 1.4 -
- Gentoo Linux 1.4 rc1
- Gentoo Linux 1.4 rc2
- Gentoo Linux 1.4 rc3
- Slackware Linux 10.0
- Slackware Linux 9.1
- Slackware Linux current
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-2004-0881, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2004-0881 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.