{"api_version":"1","generated_at":"2026-05-05T15:57:13+00:00","cve":"CVE-2008-4977","urls":{"html":"https://cve.report/CVE-2008-4977","api":"https://cve.report/api/cve/CVE-2008-4977.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2008-4977","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2008-4977"},"summary":{"title":"CVE-2008-4977","description":"postfix_groups.pl in Postfix 2.5.2 allows local users to overwrite arbitrary files via a symlink attack on the (1) /tmp/postfix_groups.stdout, (2) /tmp/postfix_groups.stderr, and (3) /tmp/postfix_groups.message temporary files.  NOTE: the vendor disputes this vulnerability, stating \"This is not a real issue ... users would have to edit a script under /usr/lib to enable it.","state":"PUBLISHED","assigner":"mitre","published_at":"2008-11-06 15:55:52","updated_at":"2026-04-23 00:35:47"},"problem_types":["CWE-59","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"6.9","severity":"","vector":"AV:L/AC:M/Au:N/C:C/I:C/A:C","data":{"version":"2.0","vectorString":"AV:L/AC:M/Au:N/C:C/I:C/A:C","baseScore":6.9,"accessVector":"LOCAL","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"}}],"references":[{"url":"http://bugs.debian.org/496401","name":"http://bugs.debian.org/496401","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"#496401 - please make debug code use safe tempfiles - Debian Bug report logs","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.openwall.com/lists/oss-security/2008/10/30/2","name":"http://www.openwall.com/lists/oss-security/2008/10/30/2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"oss-security - CVE requests: tempfile issues for aview, mgetty, openoffice, crossfire","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://bugs.gentoo.org/show_bug.cgi?id=235770","name":"https://bugs.gentoo.org/show_bug.cgi?id=235770","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"235770 – (debian-tempfile) [Tracker] Tempfile issues found in Debian","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://dev.gentoo.org/~rbu/security/debiantemp/postfix","name":"http://dev.gentoo.org/~rbu/security/debiantemp/postfix","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"],"title":"404 Not Found","mime":"text/plain","httpstatus":"404","archivestatus":"200"},{"url":"https://bugs.gentoo.org/show_bug.cgi?id=235811","name":"https://bugs.gentoo.org/show_bug.cgi?id=235811","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"235811 – mail-mta/postfix: audit wrt insecure temp file usage","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2008-4977","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-4977","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2008","cve_id":"4977","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"postfix","cpe5":"postfix","cpe6":"2.5.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[{"cvename":"CVE-2008-4977","organization":"Red Hat","lastmodified":"2008-11-06","contributor":"Tomas Hoger","statementText":"Not vulnerable. This issue did not affect the versions of postfix as shipped with Red Hat Enterprise Linux 3, 4, or 5. Mentioned script is not part of the official postfix distribution and is not included in Red Hat Enterprise Linux postfix packages.","cve_year":"2008","cve_id":"4977","crc32":"ca79578a"}],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-07T10:31:28.331Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"[oss-security] 20081030 CVE requests: tempfile issues for aview, mgetty, openoffice, crossfire","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2008/10/30/2"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://bugs.gentoo.org/show_bug.cgi?id=235770"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://dev.gentoo.org/~rbu/security/debiantemp/postfix"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://bugs.debian.org/496401"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://bugs.gentoo.org/show_bug.cgi?id=235811"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"descriptions":[{"lang":"en","value":"postfix_groups.pl in Postfix 2.5.2 allows local users to overwrite arbitrary files via a symlink attack on the (1) /tmp/postfix_groups.stdout, (2) /tmp/postfix_groups.stderr, and (3) /tmp/postfix_groups.message temporary files.  NOTE: the vendor disputes this vulnerability, stating \"This is not a real issue ... users would have to edit a script under /usr/lib to enable it."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2008-11-06T11:00:00.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"name":"[oss-security] 20081030 CVE requests: tempfile issues for aview, mgetty, openoffice, crossfire","tags":["mailing-list","x_refsource_MLIST"],"url":"http://www.openwall.com/lists/oss-security/2008/10/30/2"},{"tags":["x_refsource_MISC"],"url":"https://bugs.gentoo.org/show_bug.cgi?id=235770"},{"tags":["x_refsource_MISC"],"url":"http://dev.gentoo.org/~rbu/security/debiantemp/postfix"},{"tags":["x_refsource_MISC"],"url":"http://bugs.debian.org/496401"},{"tags":["x_refsource_MISC"],"url":"https://bugs.gentoo.org/show_bug.cgi?id=235811"}],"tags":["disputed"],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2008-4977","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"** DISPUTED **  postfix_groups.pl in Postfix 2.5.2 allows local users to overwrite arbitrary files via a symlink attack on the (1) /tmp/postfix_groups.stdout, (2) /tmp/postfix_groups.stderr, and (3) /tmp/postfix_groups.message temporary files.  NOTE: the vendor disputes this vulnerability, stating \"This is not a real issue ... users would have to edit a script under /usr/lib to enable it.\""}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"[oss-security] 20081030 CVE requests: tempfile issues for aview, mgetty, openoffice, crossfire","refsource":"MLIST","url":"http://www.openwall.com/lists/oss-security/2008/10/30/2"},{"name":"https://bugs.gentoo.org/show_bug.cgi?id=235770","refsource":"MISC","url":"https://bugs.gentoo.org/show_bug.cgi?id=235770"},{"name":"http://dev.gentoo.org/~rbu/security/debiantemp/postfix","refsource":"MISC","url":"http://dev.gentoo.org/~rbu/security/debiantemp/postfix"},{"name":"http://bugs.debian.org/496401","refsource":"MISC","url":"http://bugs.debian.org/496401"},{"name":"https://bugs.gentoo.org/show_bug.cgi?id=235811","refsource":"MISC","url":"https://bugs.gentoo.org/show_bug.cgi?id=235811"}]}}}},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2008-4977","datePublished":"2008-11-06T11:00:00.000Z","dateReserved":"2008-11-06T00:00:00.000Z","dateUpdated":"2024-09-17T00:50:31.809Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2008-11-06 15:55:52","lastModifiedDate":"2026-04-23 00:35:47","problem_types":["CWE-59","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:M/Au:N/C:C/I:C/A:C","baseScore":6.9,"accessVector":"LOCAL","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"MEDIUM","exploitabilityScore":3.4,"impactScore":10,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:postfix:postfix:2.5.2:*:*:*:*:*:*:*","matchCriteriaId":"A1DE90BD-B5F9-4762-B086-130AB04F3CB0"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2008","CveId":"4977","Ordinal":"1","Title":"CVE-2008-4977","CVE":"CVE-2008-4977","Year":"2008"},"notes":[{"CveYear":"2008","CveId":"4977","Ordinal":"1","NoteData":"postfix_groups.pl in Postfix 2.5.2 allows local users to overwrite arbitrary files via a symlink attack on the (1) /tmp/postfix_groups.stdout, (2) /tmp/postfix_groups.stderr, and (3) /tmp/postfix_groups.message temporary files.  NOTE: the vendor disputes this vulnerability, stating \"This is not a real issue ... users would have to edit a script under /usr/lib to enable it.","Type":"Description","Title":"CVE-2008-4977"},{"CveYear":"2008","CveId":"4977","Ordinal":"2","NoteData":"2008-11-06","Type":"Other","Title":"Published"}]}}}