7.8

CVE-2010-4345

Warning
Media report

Exim 4.72 and earlier allows local users to gain privileges by leveraging the ability of the exim user account to specify an alternate configuration file with a directive that contains arbitrary commands, as demonstrated by the spool_directory directive.

Data is provided by the National Vulnerability Database (NVD)
EximExim Version <= 4.72
OpensuseOpensuse Version11.1
OpensuseOpensuse Version11.2
OpensuseOpensuse Version11.3
DebianDebian Linux Version5.0
CanonicalUbuntu Linux Version6.06
CanonicalUbuntu Linux Version8.04 SwEdition-
CanonicalUbuntu Linux Version9.10
CanonicalUbuntu Linux Version10.04 SwEdition-
CanonicalUbuntu Linux Version10.10

25.03.2022: CISA Known Exploited Vulnerabilities (KEV) Catalog

Exim Privilege Escalation Vulnerability

Vulnerability

Exim allows local users to gain privileges by leveraging the ability of the exim user account to specify an alternate configuration file with a directive that contains arbitrary commands.

Description

Apply updates per vendor instructions.

Required actions
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 4.02% 0.881
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 6.9 3.4 10
AV:L/AC:M/Au:N/C:C/I:C/A:C
134c704f-9b21-4f2e-91b3-4a467353bcc0 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')

The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.

http://secunia.com/advisories/42576
Vendor Advisory
Broken Link
http://www.debian.org/security/2010/dsa-2131
Third Party Advisory
Mailing List
http://www.securityfocus.com/archive/1/515172/100/0/threaded
Third Party Advisory
Broken Link
VDB Entry
http://www.debian.org/security/2011/dsa-2154
Third Party Advisory
Mailing List
http://www.kb.cert.org/vuls/id/758489
Third Party Advisory
US Government Resource
http://www.securityfocus.com/bid/45341
Third Party Advisory
Broken Link
VDB Entry
http://www.securitytracker.com/id?1024859
Third Party Advisory
Broken Link
VDB Entry