fkie_cve-2010-2023
Vulnerability from fkie_nvd
Published
2010-06-07 17:12
Modified
2025-04-11 00:51
Severity ?
Summary
transports/appendfile.c in Exim before 4.72, when a world-writable sticky-bit mail directory is used, does not verify the st_nlink field of mailbox files, which allows local users to cause a denial of service or possibly gain privileges by creating a hard link to another user's file.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| exim | exim | * | |
| exim | exim | 4.10 | |
| exim | exim | 4.20 | |
| exim | exim | 4.21 | |
| exim | exim | 4.22 | |
| exim | exim | 4.23 | |
| exim | exim | 4.24 | |
| exim | exim | 4.30 | |
| exim | exim | 4.31 | |
| exim | exim | 4.32 | |
| exim | exim | 4.33 | |
| exim | exim | 4.34 | |
| exim | exim | 4.40 | |
| exim | exim | 4.41 | |
| exim | exim | 4.42 | |
| exim | exim | 4.43 | |
| exim | exim | 4.44 | |
| exim | exim | 4.50 | |
| exim | exim | 4.51 | |
| exim | exim | 4.52 | |
| exim | exim | 4.53 | |
| exim | exim | 4.54 | |
| exim | exim | 4.60 | |
| exim | exim | 4.61 | |
| exim | exim | 4.62 | |
| exim | exim | 4.63 | |
| exim | exim | 4.64 | |
| exim | exim | 4.65 | |
| exim | exim | 4.66 | |
| exim | exim | 4.67 | |
| exim | exim | 4.68 | |
| exim | exim | 4.69 | |
| exim | exim | 4.70 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3F612EF3-5909-4AA7-9041-02C193E447C4",
"versionEndIncluding": "4.71",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.10:*:*:*:*:*:*:*",
"matchCriteriaId": "0EC43E6B-2DA9-496E-BAD2-04FF4C3A53FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.20:*:*:*:*:*:*:*",
"matchCriteriaId": "04C4B45D-A0AC-42B3-99D7-91F7B8D15B69",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.21:*:*:*:*:*:*:*",
"matchCriteriaId": "ED822CDF-C94B-4A16-BEEB-FECE51CBB744",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.22:*:*:*:*:*:*:*",
"matchCriteriaId": "B52A1ECA-44CC-4DDE-B1AD-25AE27605317",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.23:*:*:*:*:*:*:*",
"matchCriteriaId": "3E7D5D6F-8FDB-4AC2-A4D9-16E632AC8EAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.24:*:*:*:*:*:*:*",
"matchCriteriaId": "A4FEC2B4-BD68-428E-91BC-BC85F72E3BE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.30:*:*:*:*:*:*:*",
"matchCriteriaId": "23EEBB47-2495-4FDB-9A55-415DA69392E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.31:*:*:*:*:*:*:*",
"matchCriteriaId": "D4A8E154-32CC-4665-82A0-1DE7A51B2435",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.32:*:*:*:*:*:*:*",
"matchCriteriaId": "4B594190-DF8F-45AE-8579-BD7B4568606F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.33:*:*:*:*:*:*:*",
"matchCriteriaId": "BD2D8712-4DF9-4A73-93A7-7719C3502E18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.34:*:*:*:*:*:*:*",
"matchCriteriaId": "2D9DF054-4CBF-4BA7-9A42-5627DC4B6A68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.40:*:*:*:*:*:*:*",
"matchCriteriaId": "B13E6533-BEB9-4082-9063-7E3CCBF4C36C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.41:*:*:*:*:*:*:*",
"matchCriteriaId": "879B9641-3245-4CF7-912A-FD21372F46F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.42:*:*:*:*:*:*:*",
"matchCriteriaId": "A91CA841-BBCA-4EF9-BC00-478A18797941",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.43:*:*:*:*:*:*:*",
"matchCriteriaId": "EEA3F58C-3EF2-48B9-9171-7EFE72B1A3DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.44:*:*:*:*:*:*:*",
"matchCriteriaId": "AFB37C45-54E7-4E91-8E6D-0A3E764E1702",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.50:*:*:*:*:*:*:*",
"matchCriteriaId": "31CBE3C0-4918-4FA6-B1E7-6336913EF8D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.51:*:*:*:*:*:*:*",
"matchCriteriaId": "FC45BCE0-F190-4050-8B3B-869D0C1033AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.52:*:*:*:*:*:*:*",
"matchCriteriaId": "6FD0E5A4-3FCB-46C1-A709-CA15D96FA9B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.53:*:*:*:*:*:*:*",
"matchCriteriaId": "D3335C80-97AE-42DB-B125-0D3FA57D8317",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.54:*:*:*:*:*:*:*",
"matchCriteriaId": "0F83560A-BDD7-456D-846C-D1DAF5C9DA64",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.60:*:*:*:*:*:*:*",
"matchCriteriaId": "22B9FD06-13E3-47CA-AB67-691DC3A9C330",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.61:*:*:*:*:*:*:*",
"matchCriteriaId": "EE2A81F2-3E53-4A31-BCC6-BDC0E1B62CC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.62:*:*:*:*:*:*:*",
"matchCriteriaId": "2A03C071-87BF-4D5E-ABED-472ABAEFAC71",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.63:*:*:*:*:*:*:*",
"matchCriteriaId": "D1D96C53-989C-42C8-9E71-A206B78ED55A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.64:*:*:*:*:*:*:*",
"matchCriteriaId": "30190EAB-7140-4E0A-B7A5-8FA8BD0749C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.65:*:*:*:*:*:*:*",
"matchCriteriaId": "E0BD63C5-C916-4D7D-AE81-7B9676FC0951",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.66:*:*:*:*:*:*:*",
"matchCriteriaId": "CCD8FE2F-8D53-407A-BB83-EB7725456D71",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.67:*:*:*:*:*:*:*",
"matchCriteriaId": "162F5CB4-1931-4236-8519-DD63A98BCEE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.68:*:*:*:*:*:*:*",
"matchCriteriaId": "9EF06704-E078-42FA-89DA-7BCA169D0E5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.69:*:*:*:*:*:*:*",
"matchCriteriaId": "B8F2CB6E-1ED1-4E56-9532-30D2BA6A53DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:exim:exim:4.70:*:*:*:*:*:*:*",
"matchCriteriaId": "452E9C94-B7FF-40A9-A7F9-FC38824F6135",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "transports/appendfile.c in Exim before 4.72, when a world-writable sticky-bit mail directory is used, does not verify the st_nlink field of mailbox files, which allows local users to cause a denial of service or possibly gain privileges by creating a hard link to another user\u0027s file."
},
{
"lang": "es",
"value": "transports/appendfile.c en Exim antes de v4.72, cuando se usa un directorio de correo con permisos de escritura para todos y sticky-bit activado, no verifica el campo de st_nlink de los ficheros de buz\u00f3n de correo, que permite a usuarios locales causar una denegaci\u00f3n de servicio o posiblemente obtener privilegios mediante la creaci\u00f3n de un v\u00ednculo f\u00edsico a un archivo de otro usuario."
}
],
"id": "CVE-2010-2023",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.4,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2010-06-07T17:12:48.247",
"references": [
{
"source": "cve@mitre.org",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-06/0079.html"
},
{
"source": "cve@mitre.org",
"url": "http://bugs.exim.org/show_bug.cgi?id=988"
},
{
"source": "cve@mitre.org",
"url": "http://lists.exim.org/lurker/message/20100524.175925.9a69f755.en.html"
},
{
"source": "cve@mitre.org",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042587.html"
},
{
"source": "cve@mitre.org",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042613.html"
},
{
"source": "cve@mitre.org",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/40019"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/40123"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/43243"
},
{
"source": "cve@mitre.org",
"url": "http://vcs.exim.org/viewvc/exim/exim-doc/doc-txt/ChangeLog?view=markup\u0026pathrev=exim-4_72_RC2"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://vcs.exim.org/viewvc/exim/exim-src/src/transports/appendfile.c?r1=1.24\u0026r2=1.25"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/511653/100/0/threaded"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/40451"
},
{
"source": "cve@mitre.org",
"url": "http://www.ubuntu.com/usn/USN-1060-1"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2010/1402"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2011/0364"
},
{
"source": "cve@mitre.org",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=600093"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59043"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-06/0079.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://bugs.exim.org/show_bug.cgi?id=988"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.exim.org/lurker/message/20100524.175925.9a69f755.en.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042587.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042613.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/40019"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/40123"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/43243"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://vcs.exim.org/viewvc/exim/exim-doc/doc-txt/ChangeLog?view=markup\u0026pathrev=exim-4_72_RC2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://vcs.exim.org/viewvc/exim/exim-src/src/transports/appendfile.c?r1=1.24\u0026r2=1.25"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/511653/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/40451"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ubuntu.com/usn/USN-1060-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2010/1402"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2011/0364"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=600093"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59043"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-362"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…