CVE-2011-0017

The open_log function in log.c in Exim 4.72 and earlier does not check the return value from (1) setuid or (2) setgid system calls, which allows local users to append log data to arbitrary files via a symlink attack.
References
Link Resource
ftp://ftp.exim.org/pub/exim/ChangeLogs/ChangeLog-4.74
http://lists.exim.org/lurker/message/20110126.034702.4d69c278.en.html Patch
http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html
http://osvdb.org/70696
http://secunia.com/advisories/43101 Vendor Advisory
http://secunia.com/advisories/43128 Vendor Advisory
http://secunia.com/advisories/43243
http://www.debian.org/security/2011/dsa-2154
http://www.securityfocus.com/bid/46065
http://www.ubuntu.com/usn/USN-1060-1
http://www.vupen.com/english/advisories/2011/0224 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0245 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0364
http://www.vupen.com/english/advisories/2011/0464
https://exchange.xforce.ibmcloud.com/vulnerabilities/65028
ftp://ftp.exim.org/pub/exim/ChangeLogs/ChangeLog-4.74
http://lists.exim.org/lurker/message/20110126.034702.4d69c278.en.html Patch
http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html
http://osvdb.org/70696
http://secunia.com/advisories/43101 Vendor Advisory
http://secunia.com/advisories/43128 Vendor Advisory
http://secunia.com/advisories/43243
http://www.debian.org/security/2011/dsa-2154
http://www.securityfocus.com/bid/46065
http://www.ubuntu.com/usn/USN-1060-1
http://www.vupen.com/english/advisories/2011/0224 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0245 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0364
http://www.vupen.com/english/advisories/2011/0464
https://exchange.xforce.ibmcloud.com/vulnerabilities/65028
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:2.10:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:2.11:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:2.12:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:3.00:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:3.01:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:3.02:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:3.03:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:3.10:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:3.11:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:3.12:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:3.13:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:3.14:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:3.15:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:3.16:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:3.20:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:3.21:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:3.22:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:3.30:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:3.31:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:3.32:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:3.33:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:3.34:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:3.35:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:3.36:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.00:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.01:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.02:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.03:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.04:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.05:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.10:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.11:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.12:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.14:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.20:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.21:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.22:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.23:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.24:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.30:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.31:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.32:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.33:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.34:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.40:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.41:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.42:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.43:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.44:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.50:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.51:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.52:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.53:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.54:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.60:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.61:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.62:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.63:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.64:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.65:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.66:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.67:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.68:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.69:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.70:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.71:*:*:*:*:*:*:*

History

21 Nov 2024, 01:23

Type Values Removed Values Added
References () ftp://ftp.exim.org/pub/exim/ChangeLogs/ChangeLog-4.74 - () ftp://ftp.exim.org/pub/exim/ChangeLogs/ChangeLog-4.74 -
References () http://lists.exim.org/lurker/message/20110126.034702.4d69c278.en.html - Patch () http://lists.exim.org/lurker/message/20110126.034702.4d69c278.en.html - Patch
References () http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html - () http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html -
References () http://osvdb.org/70696 - () http://osvdb.org/70696 -
References () http://secunia.com/advisories/43101 - Vendor Advisory () http://secunia.com/advisories/43101 - Vendor Advisory
References () http://secunia.com/advisories/43128 - Vendor Advisory () http://secunia.com/advisories/43128 - Vendor Advisory
References () http://secunia.com/advisories/43243 - () http://secunia.com/advisories/43243 -
References () http://www.debian.org/security/2011/dsa-2154 - () http://www.debian.org/security/2011/dsa-2154 -
References () http://www.securityfocus.com/bid/46065 - () http://www.securityfocus.com/bid/46065 -
References () http://www.ubuntu.com/usn/USN-1060-1 - () http://www.ubuntu.com/usn/USN-1060-1 -
References () http://www.vupen.com/english/advisories/2011/0224 - Vendor Advisory () http://www.vupen.com/english/advisories/2011/0224 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2011/0245 - Vendor Advisory () http://www.vupen.com/english/advisories/2011/0245 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2011/0364 - () http://www.vupen.com/english/advisories/2011/0364 -
References () http://www.vupen.com/english/advisories/2011/0464 - () http://www.vupen.com/english/advisories/2011/0464 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/65028 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/65028 -

Information

Published : 2011-02-02 01:00

Updated : 2024-11-21 01:23


NVD link : CVE-2011-0017

Mitre link : CVE-2011-0017

CVE.ORG link : CVE-2011-0017


JSON object : View

Products Affected

exim

  • exim
CWE
CWE-20

Improper Input Validation

CWE-59

Improper Link Resolution Before File Access ('Link Following')