CVE-2010-4345
high-risk
Published 2010-12-14
Exim 4.72 and earlier allows local users to gain privileges by leveraging the ability of the exim user account to specify an alternate configuration file with a directive that contains arbitrary commands, as demonstrated by the spool_directory directive.
Do I need to act?
~
5.1% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
!
CISA KEV: actively exploited in the wild
On the Known Exploited Vulnerabilities catalog — federal agencies must patch
!
1 public exploit available
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.8/10
High
LOCAL
/ LOW complexity
Affected Products (10)
References (57)
Issue Tracking
http://bugs.exim.org/show_bug.cgi?id=1044
Mailing List
http://openwall.com/lists/oss-security/2010/12/10/1
Broken Link
http://secunia.com/advisories/42576
Broken Link
http://secunia.com/advisories/42930
Broken Link
http://secunia.com/advisories/43128
Broken Link
http://secunia.com/advisories/43243
Mailing List
http://www.debian.org/security/2010/dsa-2131
Mailing List
http://www.debian.org/security/2011/dsa-2154
Third Party Advisory
http://www.kb.cert.org/vuls/id/758489
Third Party Advisory
http://www.metasploit.com/modules/exploit/unix/smtp/exim4_string_format
Broken Link
http://www.securityfocus.com/bid/45341
Broken Link
http://www.securitytracker.com/id?1024859
and 37 more references
62
/ 100
high-risk
Severity
24/34 · High
Exploitability
22/34 · High
Exposure
16/34 · Moderate