Summary
According to the version from its Banner, the remote Exim is prone to multiple vulnerabilities.
1.
Exim creates temporary files in an insecure manner.
An attacker with local access could potentially exploit this issue to perform symbolic-link attacks.
Successfully mounting a symlink attack may allow the attacker to delete or corrupt sensitive files, which may result in a denial of service. Other attacks may also be possible.
2.
Exim is prone to a local privilege-escalation vulnerability.
Local attackers can exploit this issue to gain elevated privileges on affected computers.
Versions prior to Exim 4.72 RC2 are vulnerable.
Solution
Updates are available
please see the references for more information.
References
- http://bugs.exim.org/show_bug.cgi?id=989
- http://lists.exim.org/lurker/message/20100524.175925.9a69f755.en.html
- http://vcs.exim.org/viewvc/exim/exim-doc/doc-txt/ChangeLog?view=markup&pathrev=exim-4_72_RC2
- http://www.exim.org/
- http://www.securityfocus.com/bid/40451
- http://www.securityfocus.com/bid/40454
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2010-2023, CVE-2010-2024 -
CVSS Base Score: 4.4
AV:L/AC:M/Au:N/C:P/I:P/A:P
Related Vulnerabilities
- Alt-N MDaemon SUBSCRIBE Remote Information Disclosure Vulnerability
- Sendmail ETRN command DOS
- Quick 'n Easy Mail Server SMTP Request Remote Denial Of Service Vulnerability
- poprelayd & sendmail authentication problem
- Multiple Vendors STARTTLS Implementation Plaintext Arbitrary Command Injection Vulnerability