qmail-verify as used in netqmail 1.06 is prone to an information disclosure vulnerability. A local attacker can test for the existence of files and directories anywhere in the filesystem because qmail-verify runs as root and tests for the existence of files in the attackers home directory, without dropping its privileges first.
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Netqmail | Netqmail | 1.06 (including) | 1.06 (including) |
Netqmail | Ubuntu | bionic | * |
Netqmail | Ubuntu | eoan | * |
Netqmail | Ubuntu | focal | * |
Netqmail | Ubuntu | trusty | * |
Netqmail | Ubuntu | trusty/esm | * |
Netqmail | Ubuntu | upstream | * |
Netqmail | Ubuntu | xenial | * |