fkie_cve-2010-2024
Vulnerability from fkie_nvd
Published
2010-06-07 17:12
Modified
2025-04-11 00:51
Severity ?
Summary
transports/appendfile.c in Exim before 4.72, when MBX locking is enabled, allows local users to change permissions of arbitrary files or create arbitrary files, and cause a denial of service or possibly gain privileges, via a symlink attack on a lockfile in /tmp/.
References
cve@mitre.orghttp://archives.neohapsis.com/archives/fulldisclosure/2010-06/0079.html
cve@mitre.orghttp://bugs.exim.org/show_bug.cgi?id=989Patch
cve@mitre.orghttp://lists.exim.org/lurker/message/20100524.175925.9a69f755.en.html
cve@mitre.orghttp://lists.fedoraproject.org/pipermail/package-announce/2010-June/042587.html
cve@mitre.orghttp://lists.fedoraproject.org/pipermail/package-announce/2010-June/042613.html
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html
cve@mitre.orghttp://secunia.com/advisories/40019Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/40123
cve@mitre.orghttp://secunia.com/advisories/43243
cve@mitre.orghttp://vcs.exim.org/viewvc/exim/exim-doc/doc-txt/ChangeLog?view=markup&pathrev=exim-4_72_RC2
cve@mitre.orghttp://vcs.exim.org/viewvc/exim/exim-src/src/transports/appendfile.c?r1=1.25&r2=1.26Patch
cve@mitre.orghttp://www.securityfocus.com/archive/1/511653/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/40454
cve@mitre.orghttp://www.ubuntu.com/usn/USN-1060-1
cve@mitre.orghttp://www.vupen.com/english/advisories/2010/1402
cve@mitre.orghttp://www.vupen.com/english/advisories/2011/0364
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=600097
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/59042
af854a3a-2127-422b-91ae-364da2661108http://archives.neohapsis.com/archives/fulldisclosure/2010-06/0079.html
af854a3a-2127-422b-91ae-364da2661108http://bugs.exim.org/show_bug.cgi?id=989Patch
af854a3a-2127-422b-91ae-364da2661108http://lists.exim.org/lurker/message/20100524.175925.9a69f755.en.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042587.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042613.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/40019Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/40123
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/43243
af854a3a-2127-422b-91ae-364da2661108http://vcs.exim.org/viewvc/exim/exim-doc/doc-txt/ChangeLog?view=markup&pathrev=exim-4_72_RC2
af854a3a-2127-422b-91ae-364da2661108http://vcs.exim.org/viewvc/exim/exim-src/src/transports/appendfile.c?r1=1.25&r2=1.26Patch
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/511653/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/40454
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1060-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/1402
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0364
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=600097
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/59042
Impacted products
Vendor Product Version
exim exim *
exim exim 4.10
exim exim 4.20
exim exim 4.21
exim exim 4.22
exim exim 4.23
exim exim 4.24
exim exim 4.30
exim exim 4.31
exim exim 4.32
exim exim 4.33
exim exim 4.34
exim exim 4.40
exim exim 4.41
exim exim 4.42
exim exim 4.43
exim exim 4.44
exim exim 4.50
exim exim 4.51
exim exim 4.52
exim exim 4.53
exim exim 4.54
exim exim 4.60
exim exim 4.61
exim exim 4.62
exim exim 4.63
exim exim 4.64
exim exim 4.65
exim exim 4.66
exim exim 4.67
exim exim 4.68
exim exim 4.69
exim exim 4.70



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F612EF3-5909-4AA7-9041-02C193E447C4",
              "versionEndIncluding": "4.71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:exim:exim:4.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EC43E6B-2DA9-496E-BAD2-04FF4C3A53FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:exim:exim:4.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "04C4B45D-A0AC-42B3-99D7-91F7B8D15B69",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:exim:exim:4.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED822CDF-C94B-4A16-BEEB-FECE51CBB744",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:exim:exim:4.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "B52A1ECA-44CC-4DDE-B1AD-25AE27605317",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:exim:exim:4.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E7D5D6F-8FDB-4AC2-A4D9-16E632AC8EAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:exim:exim:4.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4FEC2B4-BD68-428E-91BC-BC85F72E3BE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:exim:exim:4.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "23EEBB47-2495-4FDB-9A55-415DA69392E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:exim:exim:4.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4A8E154-32CC-4665-82A0-1DE7A51B2435",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:exim:exim:4.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B594190-DF8F-45AE-8579-BD7B4568606F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:exim:exim:4.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD2D8712-4DF9-4A73-93A7-7719C3502E18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:exim:exim:4.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D9DF054-4CBF-4BA7-9A42-5627DC4B6A68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:exim:exim:4.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "B13E6533-BEB9-4082-9063-7E3CCBF4C36C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:exim:exim:4.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "879B9641-3245-4CF7-912A-FD21372F46F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:exim:exim:4.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "A91CA841-BBCA-4EF9-BC00-478A18797941",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:exim:exim:4.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEA3F58C-3EF2-48B9-9171-7EFE72B1A3DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:exim:exim:4.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFB37C45-54E7-4E91-8E6D-0A3E764E1702",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:exim:exim:4.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "31CBE3C0-4918-4FA6-B1E7-6336913EF8D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:exim:exim:4.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC45BCE0-F190-4050-8B3B-869D0C1033AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:exim:exim:4.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FD0E5A4-3FCB-46C1-A709-CA15D96FA9B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:exim:exim:4.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3335C80-97AE-42DB-B125-0D3FA57D8317",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:exim:exim:4.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F83560A-BDD7-456D-846C-D1DAF5C9DA64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:exim:exim:4.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "22B9FD06-13E3-47CA-AB67-691DC3A9C330",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:exim:exim:4.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE2A81F2-3E53-4A31-BCC6-BDC0E1B62CC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:exim:exim:4.62:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A03C071-87BF-4D5E-ABED-472ABAEFAC71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:exim:exim:4.63:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1D96C53-989C-42C8-9E71-A206B78ED55A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:exim:exim:4.64:*:*:*:*:*:*:*",
              "matchCriteriaId": "30190EAB-7140-4E0A-B7A5-8FA8BD0749C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:exim:exim:4.65:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0BD63C5-C916-4D7D-AE81-7B9676FC0951",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:exim:exim:4.66:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCD8FE2F-8D53-407A-BB83-EB7725456D71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:exim:exim:4.67:*:*:*:*:*:*:*",
              "matchCriteriaId": "162F5CB4-1931-4236-8519-DD63A98BCEE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:exim:exim:4.68:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EF06704-E078-42FA-89DA-7BCA169D0E5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:exim:exim:4.69:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8F2CB6E-1ED1-4E56-9532-30D2BA6A53DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:exim:exim:4.70:*:*:*:*:*:*:*",
              "matchCriteriaId": "452E9C94-B7FF-40A9-A7F9-FC38824F6135",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "transports/appendfile.c in Exim before 4.72, when MBX locking is enabled, allows local users to change permissions of arbitrary files or create arbitrary files, and cause a denial of service or possibly gain privileges, via a symlink attack on a lockfile in /tmp/."
    },
    {
      "lang": "es",
      "value": "transports/appendfile.c en Exim anterior a v4.72, cuando el bloqueo MBX est\u00e1 habilitado, permite a usuarios locales cambiar permisos de archivos o crear archivos de su elecci\u00f3n, y provocar una denegaci\u00f3n de servicio o posiblemente obtener privilegios, a trav\u00e9s de un ataque de enlace simb\u00f3lico en un fichero bloqueado en /tmp/."
    }
  ],
  "id": "CVE-2010-2024",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.4,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.4,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-06-07T17:12:48.280",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-06/0079.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://bugs.exim.org/show_bug.cgi?id=989"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.exim.org/lurker/message/20100524.175925.9a69f755.en.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042587.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042613.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/40019"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/40123"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/43243"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://vcs.exim.org/viewvc/exim/exim-doc/doc-txt/ChangeLog?view=markup\u0026pathrev=exim-4_72_RC2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://vcs.exim.org/viewvc/exim/exim-src/src/transports/appendfile.c?r1=1.25\u0026r2=1.26"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/511653/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/40454"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/USN-1060-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2010/1402"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2011/0364"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=600097"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59042"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-06/0079.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://bugs.exim.org/show_bug.cgi?id=989"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.exim.org/lurker/message/20100524.175925.9a69f755.en.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042587.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042613.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/40019"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/40123"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/43243"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://vcs.exim.org/viewvc/exim/exim-doc/doc-txt/ChangeLog?view=markup\u0026pathrev=exim-4_72_RC2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://vcs.exim.org/viewvc/exim/exim-src/src/transports/appendfile.c?r1=1.25\u0026r2=1.26"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/511653/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/40454"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1060-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2010/1402"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2011/0364"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=600097"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59042"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-362"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…