CVE-2011-3350

9.8 CRITICAL

📋 TL;DR

CVE-2011-3350 is a privilege escalation vulnerability in masqmail email forwarding software where improper seteuid() calls fail to properly drop privileges. This allows local attackers to escalate privileges to root on affected systems. Systems running vulnerable versions of masqmail are affected.

💻 Affected Systems

Products:
  • masqmail
Versions: 0.2.21 through 0.2.30
Operating Systems: Linux, Unix-like systems
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems where masqmail is installed and configured to run with elevated privileges.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains full root privileges on the system, enabling complete system compromise, data theft, and persistent backdoor installation.

🟠

Likely Case

Local user or compromised service account escalates to root privileges, allowing unauthorized access to sensitive data and system modification.

🟢

If Mitigated

With proper privilege separation and minimal user access, impact is limited to the masqmail service context only.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to the system. Proof-of-concept code has been publicly available since 2011.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: masqmail 0.2.31 and later

Vendor Advisory: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=638002

Restart Required: Yes

Instructions:

1. Update masqmail to version 0.2.31 or later using your distribution's package manager. 2. Restart the masqmail service or reboot the system.

🔧 Temporary Workarounds

Remove masqmail

linux

Uninstall masqmail if not required for system functionality

sudo apt-get remove masqmail
sudo yum remove masqmail

Restrict local access

all

Limit local user access to systems running masqmail

🧯 If You Can't Patch

  • Run masqmail with minimal necessary privileges using SELinux/AppArmor
  • Isolate masqmail to dedicated systems with no sensitive data

🔍 How to Verify

Check if Vulnerable:

Check masqmail version: dpkg -l masqmail | grep ^ii or rpm -q masqmail

Check Version:

masqmail --version

Verify Fix Applied:

Verify installed version is 0.2.31 or higher using version check command

📡 Detection & Monitoring

Log Indicators:

  • Unexpected privilege escalation attempts
  • Abnormal masqmail process behavior

Network Indicators:

  • None - local privilege escalation only

SIEM Query:

process.name="masqmail" AND event.action="privilege_escalation"

🔗 References

📤 Share & Export