CVE-2010-2023

transports/appendfile.c in Exim before 4.72, when a world-writable sticky-bit mail directory is used, does not verify the st_nlink field of mailbox files, which allows local users to cause a denial of service or possibly gain privileges by creating a hard link to another user's file.
References
Link Resource
http://archives.neohapsis.com/archives/fulldisclosure/2010-06/0079.html
http://bugs.exim.org/show_bug.cgi?id=988
http://lists.exim.org/lurker/message/20100524.175925.9a69f755.en.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042587.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042613.html
http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html
http://secunia.com/advisories/40019 Vendor Advisory
http://secunia.com/advisories/40123
http://secunia.com/advisories/43243
http://vcs.exim.org/viewvc/exim/exim-doc/doc-txt/ChangeLog?view=markup&pathrev=exim-4_72_RC2
http://vcs.exim.org/viewvc/exim/exim-src/src/transports/appendfile.c?r1=1.24&r2=1.25 Patch
http://www.securityfocus.com/archive/1/511653/100/0/threaded
http://www.securityfocus.com/bid/40451
http://www.ubuntu.com/usn/USN-1060-1
http://www.vupen.com/english/advisories/2010/1402
http://www.vupen.com/english/advisories/2011/0364
https://bugzilla.redhat.com/show_bug.cgi?id=600093
https://exchange.xforce.ibmcloud.com/vulnerabilities/59043
http://archives.neohapsis.com/archives/fulldisclosure/2010-06/0079.html
http://bugs.exim.org/show_bug.cgi?id=988
http://lists.exim.org/lurker/message/20100524.175925.9a69f755.en.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042587.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042613.html
http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html
http://secunia.com/advisories/40019 Vendor Advisory
http://secunia.com/advisories/40123
http://secunia.com/advisories/43243
http://vcs.exim.org/viewvc/exim/exim-doc/doc-txt/ChangeLog?view=markup&pathrev=exim-4_72_RC2
http://vcs.exim.org/viewvc/exim/exim-src/src/transports/appendfile.c?r1=1.24&r2=1.25 Patch
http://www.securityfocus.com/archive/1/511653/100/0/threaded
http://www.securityfocus.com/bid/40451
http://www.ubuntu.com/usn/USN-1060-1
http://www.vupen.com/english/advisories/2010/1402
http://www.vupen.com/english/advisories/2011/0364
https://bugzilla.redhat.com/show_bug.cgi?id=600093
https://exchange.xforce.ibmcloud.com/vulnerabilities/59043
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.10:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.20:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.21:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.22:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.23:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.24:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.30:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.31:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.32:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.33:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.34:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.40:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.41:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.42:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.43:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.44:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.50:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.51:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.52:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.53:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.54:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.60:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.61:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.62:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.63:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.64:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.65:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.66:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.67:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.68:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.69:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.70:*:*:*:*:*:*:*

History

21 Nov 2024, 01:15

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/fulldisclosure/2010-06/0079.html - () http://archives.neohapsis.com/archives/fulldisclosure/2010-06/0079.html -
References () http://bugs.exim.org/show_bug.cgi?id=988 - () http://bugs.exim.org/show_bug.cgi?id=988 -
References () http://lists.exim.org/lurker/message/20100524.175925.9a69f755.en.html - () http://lists.exim.org/lurker/message/20100524.175925.9a69f755.en.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042587.html - () http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042587.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042613.html - () http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042613.html -
References () http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html - () http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html -
References () http://secunia.com/advisories/40019 - Vendor Advisory () http://secunia.com/advisories/40019 - Vendor Advisory
References () http://secunia.com/advisories/40123 - () http://secunia.com/advisories/40123 -
References () http://secunia.com/advisories/43243 - () http://secunia.com/advisories/43243 -
References () http://vcs.exim.org/viewvc/exim/exim-doc/doc-txt/ChangeLog?view=markup&pathrev=exim-4_72_RC2 - () http://vcs.exim.org/viewvc/exim/exim-doc/doc-txt/ChangeLog?view=markup&pathrev=exim-4_72_RC2 -
References () http://vcs.exim.org/viewvc/exim/exim-src/src/transports/appendfile.c?r1=1.24&r2=1.25 - Patch () http://vcs.exim.org/viewvc/exim/exim-src/src/transports/appendfile.c?r1=1.24&r2=1.25 - Patch
References () http://www.securityfocus.com/archive/1/511653/100/0/threaded - () http://www.securityfocus.com/archive/1/511653/100/0/threaded -
References () http://www.securityfocus.com/bid/40451 - () http://www.securityfocus.com/bid/40451 -
References () http://www.ubuntu.com/usn/USN-1060-1 - () http://www.ubuntu.com/usn/USN-1060-1 -
References () http://www.vupen.com/english/advisories/2010/1402 - () http://www.vupen.com/english/advisories/2010/1402 -
References () http://www.vupen.com/english/advisories/2011/0364 - () http://www.vupen.com/english/advisories/2011/0364 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=600093 - () https://bugzilla.redhat.com/show_bug.cgi?id=600093 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/59043 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/59043 -

Information

Published : 2010-06-07 17:12

Updated : 2024-11-21 01:15


NVD link : CVE-2010-2023

Mitre link : CVE-2010-2023

CVE.ORG link : CVE-2010-2023


JSON object : View

Products Affected

exim

  • exim
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')