CVE-2010-2024
Severity CVSS v4.0:
Pending analysis
Type:
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Publication date:
07/06/2010
Last modified:
11/04/2025
Description
transports/appendfile.c in Exim before 4.72, when MBX locking is enabled, allows local users to change permissions of arbitrary files or create arbitrary files, and cause a denial of service or possibly gain privileges, via a symlink attack on a lockfile in /tmp/.
Impact
Base Score 2.0
4.40
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:* | 4.71 (including) | |
| cpe:2.3:a:exim:exim:4.10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:exim:exim:4.20:*:*:*:*:*:*:* | ||
| cpe:2.3:a:exim:exim:4.21:*:*:*:*:*:*:* | ||
| cpe:2.3:a:exim:exim:4.22:*:*:*:*:*:*:* | ||
| cpe:2.3:a:exim:exim:4.23:*:*:*:*:*:*:* | ||
| cpe:2.3:a:exim:exim:4.24:*:*:*:*:*:*:* | ||
| cpe:2.3:a:exim:exim:4.30:*:*:*:*:*:*:* | ||
| cpe:2.3:a:exim:exim:4.31:*:*:*:*:*:*:* | ||
| cpe:2.3:a:exim:exim:4.32:*:*:*:*:*:*:* | ||
| cpe:2.3:a:exim:exim:4.33:*:*:*:*:*:*:* | ||
| cpe:2.3:a:exim:exim:4.34:*:*:*:*:*:*:* | ||
| cpe:2.3:a:exim:exim:4.40:*:*:*:*:*:*:* | ||
| cpe:2.3:a:exim:exim:4.41:*:*:*:*:*:*:* | ||
| cpe:2.3:a:exim:exim:4.42:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://archives.neohapsis.com/archives/fulldisclosure/2010-06/0079.html
- http://bugs.exim.org/show_bug.cgi?id=989
- http://lists.exim.org/lurker/message/20100524.175925.9a69f755.en.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042587.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042613.html
- http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html
- http://secunia.com/advisories/40019
- http://secunia.com/advisories/40123
- http://secunia.com/advisories/43243
- http://vcs.exim.org/viewvc/exim/exim-doc/doc-txt/ChangeLog?view=markup&pathrev=exim-4_72_RC2
- http://vcs.exim.org/viewvc/exim/exim-src/src/transports/appendfile.c?r1=1.25&r2=1.26
- http://www.securityfocus.com/archive/1/511653/100/0/threaded
- http://www.securityfocus.com/bid/40454
- http://www.ubuntu.com/usn/USN-1060-1
- http://www.vupen.com/english/advisories/2010/1402
- http://www.vupen.com/english/advisories/2011/0364
- https://bugzilla.redhat.com/show_bug.cgi?id=600097
- https://exchange.xforce.ibmcloud.com/vulnerabilities/59042
- http://archives.neohapsis.com/archives/fulldisclosure/2010-06/0079.html
- http://bugs.exim.org/show_bug.cgi?id=989
- http://lists.exim.org/lurker/message/20100524.175925.9a69f755.en.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042587.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042613.html
- http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html
- http://secunia.com/advisories/40019
- http://secunia.com/advisories/40123
- http://secunia.com/advisories/43243
- http://vcs.exim.org/viewvc/exim/exim-doc/doc-txt/ChangeLog?view=markup&pathrev=exim-4_72_RC2
- http://vcs.exim.org/viewvc/exim/exim-src/src/transports/appendfile.c?r1=1.25&r2=1.26
- http://www.securityfocus.com/archive/1/511653/100/0/threaded
- http://www.securityfocus.com/bid/40454
- http://www.ubuntu.com/usn/USN-1060-1
- http://www.vupen.com/english/advisories/2010/1402
- http://www.vupen.com/english/advisories/2011/0364
- https://bugzilla.redhat.com/show_bug.cgi?id=600097
- https://exchange.xforce.ibmcloud.com/vulnerabilities/59042



