CVE-2011-0017 (GCVE-0-2011-0017)
Vulnerability from cvelistv5
Published
2011-02-02 00:00
Modified
2024-08-06 21:36
Severity ?
CWE
  • n/a
Summary
The open_log function in log.c in Exim 4.72 and earlier does not check the return value from (1) setuid or (2) setgid system calls, which allows local users to append log data to arbitrary files via a symlink attack.
References
secalert@redhat.com ftp://ftp.exim.org/pub/exim/ChangeLogs/ChangeLog-4.74
secalert@redhat.com http://lists.exim.org/lurker/message/20110126.034702.4d69c278.en.html Patch
secalert@redhat.com http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html
secalert@redhat.com http://osvdb.org/70696
secalert@redhat.com http://secunia.com/advisories/43101 Vendor Advisory
secalert@redhat.com http://secunia.com/advisories/43128 Vendor Advisory
secalert@redhat.com http://secunia.com/advisories/43243
secalert@redhat.com http://www.debian.org/security/2011/dsa-2154
secalert@redhat.com http://www.securityfocus.com/bid/46065
secalert@redhat.com http://www.ubuntu.com/usn/USN-1060-1
secalert@redhat.com http://www.vupen.com/english/advisories/2011/0224 Vendor Advisory
secalert@redhat.com http://www.vupen.com/english/advisories/2011/0245 Vendor Advisory
secalert@redhat.com http://www.vupen.com/english/advisories/2011/0364
secalert@redhat.com http://www.vupen.com/english/advisories/2011/0464
secalert@redhat.com https://exchange.xforce.ibmcloud.com/vulnerabilities/65028
af854a3a-2127-422b-91ae-364da2661108 ftp://ftp.exim.org/pub/exim/ChangeLogs/ChangeLog-4.74
af854a3a-2127-422b-91ae-364da2661108 http://lists.exim.org/lurker/message/20110126.034702.4d69c278.en.html Patch
af854a3a-2127-422b-91ae-364da2661108 http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html
af854a3a-2127-422b-91ae-364da2661108 http://osvdb.org/70696
af854a3a-2127-422b-91ae-364da2661108 http://secunia.com/advisories/43101 Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 http://secunia.com/advisories/43128 Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 http://secunia.com/advisories/43243
af854a3a-2127-422b-91ae-364da2661108 http://www.debian.org/security/2011/dsa-2154
af854a3a-2127-422b-91ae-364da2661108 http://www.securityfocus.com/bid/46065
af854a3a-2127-422b-91ae-364da2661108 http://www.ubuntu.com/usn/USN-1060-1
af854a3a-2127-422b-91ae-364da2661108 http://www.vupen.com/english/advisories/2011/0224 Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 http://www.vupen.com/english/advisories/2011/0245 Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 http://www.vupen.com/english/advisories/2011/0364
af854a3a-2127-422b-91ae-364da2661108 http://www.vupen.com/english/advisories/2011/0464
af854a3a-2127-422b-91ae-364da2661108 https://exchange.xforce.ibmcloud.com/vulnerabilities/65028
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T21:36:02.265Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "43128",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/43128"
          },
          {
            "name": "70696",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/70696"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "ftp://ftp.exim.org/pub/exim/ChangeLogs/ChangeLog-4.74"
          },
          {
            "name": "ADV-2011-0364",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0364"
          },
          {
            "name": "46065",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/46065"
          },
          {
            "name": "43243",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/43243"
          },
          {
            "name": "exim-openlog-privilege-escalation(65028)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65028"
          },
          {
            "name": "[exim-announce] 20110125 Exim 4.74 Release",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.exim.org/lurker/message/20110126.034702.4d69c278.en.html"
          },
          {
            "name": "ADV-2011-0224",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0224"
          },
          {
            "name": "DSA-2154",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2011/dsa-2154"
          },
          {
            "name": "SUSE-SR:2011:004",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html"
          },
          {
            "name": "ADV-2011-0464",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0464"
          },
          {
            "name": "43101",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/43101"
          },
          {
            "name": "ADV-2011-0245",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0245"
          },
          {
            "name": "USN-1060-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1060-1"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-01-25T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The open_log function in log.c in Exim 4.72 and earlier does not check the return value from (1) setuid or (2) setgid system calls, which allows local users to append log data to arbitrary files via a symlink attack."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "43128",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/43128"
        },
        {
          "name": "70696",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/70696"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "ftp://ftp.exim.org/pub/exim/ChangeLogs/ChangeLog-4.74"
        },
        {
          "name": "ADV-2011-0364",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0364"
        },
        {
          "name": "46065",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/46065"
        },
        {
          "name": "43243",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/43243"
        },
        {
          "name": "exim-openlog-privilege-escalation(65028)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65028"
        },
        {
          "name": "[exim-announce] 20110125 Exim 4.74 Release",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.exim.org/lurker/message/20110126.034702.4d69c278.en.html"
        },
        {
          "name": "ADV-2011-0224",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0224"
        },
        {
          "name": "DSA-2154",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2011/dsa-2154"
        },
        {
          "name": "SUSE-SR:2011:004",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html"
        },
        {
          "name": "ADV-2011-0464",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0464"
        },
        {
          "name": "43101",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/43101"
        },
        {
          "name": "ADV-2011-0245",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0245"
        },
        {
          "name": "USN-1060-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1060-1"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-0017",
    "datePublished": "2011-02-02T00:00:00",
    "dateReserved": "2010-12-07T00:00:00",
    "dateUpdated": "2024-08-06T21:36:02.265Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2011-0017\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2011-02-02T01:00:06.203\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The open_log function in log.c in Exim 4.72 and earlier does not check the return value from (1) setuid or (2) setgid system calls, which allows local users to append log data to arbitrary files via a symlink attack.\"},{\"lang\":\"es\",\"value\":\"La funci\u00f3n open_log en log.c de Exim v4.72 y anteriores no comprueba el valor devuelto por (1) setuid o (2) llamadas del sistema setgid, lo que permite a usuarios locales anexar los datos de registro a los archivos de su elecci\u00f3n mediante un ataque de enlace simb\u00f3lico.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:M/Au:N/C:C/I:C/A:C\",\"baseScore\":6.9,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.4,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"},{\"lang\":\"en\",\"value\":\"CWE-59\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.72\",\"matchCriteriaId\":\"91805B65-DDF2-4888-8F81-011F8D78B558\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCB4B1A4-A631-4D25-B7F1-C180098E86AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:2.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE701510-2879-4C78-8C1D-151D5C527B4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:2.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00FEC5EC-EE91-4702-BD9D-4023243AA7C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:3.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB2BAB64-3A0B-4B8D-8C9A-726435218123\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:3.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BAF74CC-9C39-4FB6-94B5-26865A8BBA5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:3.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F3BC841-2C51-4CBD-B666-FCB531F43AC4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:3.03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69C84D14-E466-4FD3-B79C-D227AD178E4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:3.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B5B15C1-3D3E-4875-AD4A-69798309DB3F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:3.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64368CD7-9F8C-4D33-98B5-2F429A1F77DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:3.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40751F4F-46A3-4047-8532-CBEF2328D99C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:3.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C38566A6-B0A0-4228-A038-04817FFD543F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:3.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1432D82-EA09-4C8B-A82D-BA41E14D3FE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:3.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E5C3CA8-00BF-4A35-AA5B-45D21CC2F965\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:3.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90E35B41-4048-43AD-8DF0-7B4088869A88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:3.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3114B51A-E651-4095-B817-0978673FDE6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:3.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6A6FC30-6AF0-4382-95B0-1672929F8150\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:3.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97A2321F-017F-4D7F-A27A-22725912ABA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:3.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2187D70-7ADA-401E-B03E-E1A92D9CDD59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:3.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8639E64-721A-4155-B775-CD3F775356F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:3.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA92BC83-33D0-4387-8C93-F2F0754E227A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:3.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7E7B583-CB1D-43FE-A05C-4B31F64FD6A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:3.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A35D9EF0-0267-4092-BC67-4C4B842B8ABF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:3.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FE35F22-5B61-45A4-B8A2-67B8E792D58C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:3.36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC707056-63FC-4E61-A9A3-F89FE0E490E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:4.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92A7C49F-8826-47A5-BA9E-28472DFC5EFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:4.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52B3A794-43C7-4071-8E5A-EA209903165F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:4.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84DBC4E0-608F-40AA-AE30-D40D72F9BED4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:4.03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71998344-4AC0-473F-980C-D8D0077E19A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:4.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42DA6BCE-7F17-4426-B514-3D50C764F4C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:4.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"032862E6-F4CB-4E0E-93CA-0663E8536A1E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:4.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EC43E6B-2DA9-496E-BAD2-04FF4C3A53FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:4.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FF31403-56FE-48D4-A93C-91B4DC89489B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:4.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB5A240D-CA4D-4929-BA60-DBE621A4E6F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:4.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BE1A094-2760-49CA-84A8-84B19BE2BE59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:4.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04C4B45D-A0AC-42B3-99D7-91F7B8D15B69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:4.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED822CDF-C94B-4A16-BEEB-FECE51CBB744\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:4.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B52A1ECA-44CC-4DDE-B1AD-25AE27605317\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:4.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E7D5D6F-8FDB-4AC2-A4D9-16E632AC8EAC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:4.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4FEC2B4-BD68-428E-91BC-BC85F72E3BE8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:4.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23EEBB47-2495-4FDB-9A55-415DA69392E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:4.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4A8E154-32CC-4665-82A0-1DE7A51B2435\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:4.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B594190-DF8F-45AE-8579-BD7B4568606F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:4.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD2D8712-4DF9-4A73-93A7-7719C3502E18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:4.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D9DF054-4CBF-4BA7-9A42-5627DC4B6A68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:4.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B13E6533-BEB9-4082-9063-7E3CCBF4C36C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:4.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"879B9641-3245-4CF7-912A-FD21372F46F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:4.42:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A91CA841-BBCA-4EF9-BC00-478A18797941\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:4.43:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EEA3F58C-3EF2-48B9-9171-7EFE72B1A3DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:4.44:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFB37C45-54E7-4E91-8E6D-0A3E764E1702\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:4.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31CBE3C0-4918-4FA6-B1E7-6336913EF8D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:4.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC45BCE0-F190-4050-8B3B-869D0C1033AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:4.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FD0E5A4-3FCB-46C1-A709-CA15D96FA9B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:4.53:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3335C80-97AE-42DB-B125-0D3FA57D8317\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:4.54:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F83560A-BDD7-456D-846C-D1DAF5C9DA64\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:4.60:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22B9FD06-13E3-47CA-AB67-691DC3A9C330\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:4.61:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE2A81F2-3E53-4A31-BCC6-BDC0E1B62CC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:4.62:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A03C071-87BF-4D5E-ABED-472ABAEFAC71\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:4.63:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1D96C53-989C-42C8-9E71-A206B78ED55A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:4.64:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30190EAB-7140-4E0A-B7A5-8FA8BD0749C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:4.65:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0BD63C5-C916-4D7D-AE81-7B9676FC0951\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:4.66:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCD8FE2F-8D53-407A-BB83-EB7725456D71\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:4.67:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"162F5CB4-1931-4236-8519-DD63A98BCEE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:4.68:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EF06704-E078-42FA-89DA-7BCA169D0E5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:4.69:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8F2CB6E-1ED1-4E56-9532-30D2BA6A53DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:4.70:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"452E9C94-B7FF-40A9-A7F9-FC38824F6135\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:exim:exim:4.71:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8EB3709-D51F-46D1-99B8-CFB4C2275077\"}]}]}],\"references\":[{\"url\":\"ftp://ftp.exim.org/pub/exim/ChangeLogs/ChangeLog-4.74\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.exim.org/lurker/message/20110126.034702.4d69c278.en.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://osvdb.org/70696\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/43101\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/43128\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/43243\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2011/dsa-2154\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/46065\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/USN-1060-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/0224\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0245\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0364\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/0464\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/65028\",\"source\":\"secalert@redhat.com\"},{\"url\":\"ftp://ftp.exim.org/pub/exim/ChangeLogs/ChangeLog-4.74\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.exim.org/lurker/message/20110126.034702.4d69c278.en.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://osvdb.org/70696\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/43101\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/43128\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/43243\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2011/dsa-2154\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/46065\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-1060-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/0224\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0245\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0364\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/0464\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/65028\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…