Show plain JSON{"id": "CVE-2010-2023", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.4, "accessVector": "LOCAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 3.4, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2010-06-07T17:12:48.247", "references": [{"url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-06/0079.html", "source": "cve@mitre.org"}, {"url": "http://bugs.exim.org/show_bug.cgi?id=988", "source": "cve@mitre.org"}, {"url": "http://lists.exim.org/lurker/message/20100524.175925.9a69f755.en.html", "source": "cve@mitre.org"}, {"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042587.html", "source": "cve@mitre.org"}, {"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042613.html", "source": "cve@mitre.org"}, {"url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html", "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/40019", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/40123", "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/43243", "source": "cve@mitre.org"}, {"url": "http://vcs.exim.org/viewvc/exim/exim-doc/doc-txt/ChangeLog?view=markup&pathrev=exim-4_72_RC2", "source": "cve@mitre.org"}, {"url": "http://vcs.exim.org/viewvc/exim/exim-src/src/transports/appendfile.c?r1=1.24&r2=1.25", "tags": ["Patch"], "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/511653/100/0/threaded", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/40451", "source": "cve@mitre.org"}, {"url": "http://www.ubuntu.com/usn/USN-1060-1", "source": "cve@mitre.org"}, {"url": "http://www.vupen.com/english/advisories/2010/1402", "source": "cve@mitre.org"}, {"url": "http://www.vupen.com/english/advisories/2011/0364", "source": "cve@mitre.org"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=600093", "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59043", "source": "cve@mitre.org"}, {"url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-06/0079.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://bugs.exim.org/show_bug.cgi?id=988", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://lists.exim.org/lurker/message/20100524.175925.9a69f755.en.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042587.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042613.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/40019", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/40123", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/43243", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://vcs.exim.org/viewvc/exim/exim-doc/doc-txt/ChangeLog?view=markup&pathrev=exim-4_72_RC2", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://vcs.exim.org/viewvc/exim/exim-src/src/transports/appendfile.c?r1=1.24&r2=1.25", "tags": ["Patch"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/archive/1/511653/100/0/threaded", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/40451", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.ubuntu.com/usn/USN-1060-1", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.vupen.com/english/advisories/2010/1402", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.vupen.com/english/advisories/2011/0364", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=600093", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59043", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-362"}]}], "descriptions": [{"lang": "en", "value": "transports/appendfile.c in Exim before 4.72, when a world-writable sticky-bit mail directory is used, does not verify the st_nlink field of mailbox files, which allows local users to cause a denial of service or possibly gain privileges by creating a hard link to another user's file."}, {"lang": "es", "value": "transports/appendfile.c en Exim antes de v4.72, cuando se usa un directorio de correo con permisos de escritura para todos y sticky-bit activado, no verifica el campo de st_nlink de los ficheros de buz\u00f3n de correo, que permite a usuarios locales causar una denegaci\u00f3n de servicio o posiblemente obtener privilegios mediante la creaci\u00f3n de un v\u00ednculo f\u00edsico a un archivo de otro usuario."}], "lastModified": "2024-11-21T01:15:43.950", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3F612EF3-5909-4AA7-9041-02C193E447C4", "versionEndIncluding": "4.71"}, {"criteria": "cpe:2.3:a:exim:exim:4.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0EC43E6B-2DA9-496E-BAD2-04FF4C3A53FA"}, {"criteria": "cpe:2.3:a:exim:exim:4.20:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "04C4B45D-A0AC-42B3-99D7-91F7B8D15B69"}, {"criteria": "cpe:2.3:a:exim:exim:4.21:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ED822CDF-C94B-4A16-BEEB-FECE51CBB744"}, {"criteria": "cpe:2.3:a:exim:exim:4.22:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B52A1ECA-44CC-4DDE-B1AD-25AE27605317"}, {"criteria": "cpe:2.3:a:exim:exim:4.23:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3E7D5D6F-8FDB-4AC2-A4D9-16E632AC8EAC"}, {"criteria": "cpe:2.3:a:exim:exim:4.24:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A4FEC2B4-BD68-428E-91BC-BC85F72E3BE8"}, {"criteria": "cpe:2.3:a:exim:exim:4.30:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "23EEBB47-2495-4FDB-9A55-415DA69392E8"}, {"criteria": "cpe:2.3:a:exim:exim:4.31:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D4A8E154-32CC-4665-82A0-1DE7A51B2435"}, {"criteria": "cpe:2.3:a:exim:exim:4.32:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4B594190-DF8F-45AE-8579-BD7B4568606F"}, {"criteria": "cpe:2.3:a:exim:exim:4.33:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BD2D8712-4DF9-4A73-93A7-7719C3502E18"}, {"criteria": "cpe:2.3:a:exim:exim:4.34:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2D9DF054-4CBF-4BA7-9A42-5627DC4B6A68"}, {"criteria": "cpe:2.3:a:exim:exim:4.40:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B13E6533-BEB9-4082-9063-7E3CCBF4C36C"}, {"criteria": "cpe:2.3:a:exim:exim:4.41:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "879B9641-3245-4CF7-912A-FD21372F46F4"}, {"criteria": "cpe:2.3:a:exim:exim:4.42:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A91CA841-BBCA-4EF9-BC00-478A18797941"}, {"criteria": "cpe:2.3:a:exim:exim:4.43:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EEA3F58C-3EF2-48B9-9171-7EFE72B1A3DD"}, {"criteria": "cpe:2.3:a:exim:exim:4.44:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AFB37C45-54E7-4E91-8E6D-0A3E764E1702"}, {"criteria": "cpe:2.3:a:exim:exim:4.50:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "31CBE3C0-4918-4FA6-B1E7-6336913EF8D6"}, {"criteria": "cpe:2.3:a:exim:exim:4.51:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FC45BCE0-F190-4050-8B3B-869D0C1033AE"}, {"criteria": "cpe:2.3:a:exim:exim:4.52:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6FD0E5A4-3FCB-46C1-A709-CA15D96FA9B0"}, {"criteria": "cpe:2.3:a:exim:exim:4.53:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D3335C80-97AE-42DB-B125-0D3FA57D8317"}, {"criteria": "cpe:2.3:a:exim:exim:4.54:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0F83560A-BDD7-456D-846C-D1DAF5C9DA64"}, {"criteria": "cpe:2.3:a:exim:exim:4.60:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "22B9FD06-13E3-47CA-AB67-691DC3A9C330"}, {"criteria": "cpe:2.3:a:exim:exim:4.61:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EE2A81F2-3E53-4A31-BCC6-BDC0E1B62CC8"}, {"criteria": "cpe:2.3:a:exim:exim:4.62:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2A03C071-87BF-4D5E-ABED-472ABAEFAC71"}, {"criteria": "cpe:2.3:a:exim:exim:4.63:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D1D96C53-989C-42C8-9E71-A206B78ED55A"}, {"criteria": "cpe:2.3:a:exim:exim:4.64:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "30190EAB-7140-4E0A-B7A5-8FA8BD0749C9"}, {"criteria": "cpe:2.3:a:exim:exim:4.65:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E0BD63C5-C916-4D7D-AE81-7B9676FC0951"}, {"criteria": "cpe:2.3:a:exim:exim:4.66:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CCD8FE2F-8D53-407A-BB83-EB7725456D71"}, {"criteria": "cpe:2.3:a:exim:exim:4.67:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "162F5CB4-1931-4236-8519-DD63A98BCEE0"}, {"criteria": "cpe:2.3:a:exim:exim:4.68:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9EF06704-E078-42FA-89DA-7BCA169D0E5B"}, {"criteria": "cpe:2.3:a:exim:exim:4.69:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B8F2CB6E-1ED1-4E56-9532-30D2BA6A53DD"}, {"criteria": "cpe:2.3:a:exim:exim:4.70:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "452E9C94-B7FF-40A9-A7F9-FC38824F6135"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}