CVE-2010-4345

7.8 HIGH CISA KEV - Actively Exploited
Published: December 14, 2010 Modified: October 22, 2025
View on NVD

Description

Exim 4.72 and earlier allows local users to gain privileges by leveraging the ability of the exim user account to specify an alternate configuration file with a directive that contains arbitrary commands, as demonstrated by the spool_directory directive.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://bugs.exim.org/show_bug.cgi?id=1044
Source: secalert@redhat.com
Issue Tracking Patch
http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00003.html
Source: secalert@redhat.com
Mailing List Third Party Advisory
http://openwall.com/lists/oss-security/2010/12/10/1
Source: secalert@redhat.com
Mailing List
http://secunia.com/advisories/42576
Source: secalert@redhat.com
Broken Link Vendor Advisory
http://secunia.com/advisories/42930
Source: secalert@redhat.com
Broken Link
http://secunia.com/advisories/43128
Source: secalert@redhat.com
Broken Link
http://secunia.com/advisories/43243
Source: secalert@redhat.com
Broken Link
http://www.debian.org/security/2010/dsa-2131
Source: secalert@redhat.com
Mailing List Third Party Advisory
http://www.debian.org/security/2011/dsa-2154
Source: secalert@redhat.com
Mailing List Third Party Advisory
http://www.exim.org/lurker/message/20101207.215955.bb32d4f2.en.html
Source: secalert@redhat.com
Mailing List Vendor Advisory
http://www.kb.cert.org/vuls/id/758489
Source: secalert@redhat.com
Third Party Advisory US Government Resource
http://www.metasploit.com/modules/exploit/unix/smtp/exim4_string_format
Source: secalert@redhat.com
Third Party Advisory
http://www.openwall.com/lists/oss-security/2021/05/04/7
Source: secalert@redhat.com
Mailing List
http://www.redhat.com/support/errata/RHSA-2011-0153.html
Source: secalert@redhat.com
Broken Link
http://www.securityfocus.com/archive/1/515172/100/0/threaded
Source: secalert@redhat.com
Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/45341
Source: secalert@redhat.com
Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1024859
Source: secalert@redhat.com
Broken Link Third Party Advisory VDB Entry
http://www.theregister.co.uk/2010/12/11/exim_code_execution_peril/
Source: secalert@redhat.com
Press/Media Coverage Third Party Advisory
http://www.ubuntu.com/usn/USN-1060-1
Source: secalert@redhat.com
Third Party Advisory
http://www.vupen.com/english/advisories/2010/3171
Source: secalert@redhat.com
Broken Link Vendor Advisory
http://www.vupen.com/english/advisories/2010/3204
Source: secalert@redhat.com
Broken Link Vendor Advisory
http://www.vupen.com/english/advisories/2011/0135
Source: secalert@redhat.com
Broken Link
http://www.vupen.com/english/advisories/2011/0245
Source: secalert@redhat.com
Broken Link
http://www.vupen.com/english/advisories/2011/0364
Source: secalert@redhat.com
Broken Link
https://bugzilla.redhat.com/show_bug.cgi?id=662012
Source: secalert@redhat.com
Issue Tracking Patch
http://bugs.exim.org/show_bug.cgi?id=1044
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking Patch
http://lists.exim.org/lurker/message/20101209.172233.abcba158.en.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Patch
http://lists.exim.org/lurker/message/20101210.164935.385e04d0.en.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00003.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://openwall.com/lists/oss-security/2010/12/10/1
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://secunia.com/advisories/42576
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Vendor Advisory
http://secunia.com/advisories/42930
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/43128
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/43243
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.cpanel.net/2010/12/critical-exim-security-update.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.debian.org/security/2010/dsa-2131
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://www.debian.org/security/2011/dsa-2154
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://www.exim.org/lurker/message/20101207.215955.bb32d4f2.en.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Vendor Advisory
http://www.kb.cert.org/vuls/id/758489
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory US Government Resource
http://www.metasploit.com/modules/exploit/unix/smtp/exim4_string_format
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.openwall.com/lists/oss-security/2021/05/04/7
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.redhat.com/support/errata/RHSA-2011-0153.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.securityfocus.com/archive/1/515172/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/45341
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1024859
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Third Party Advisory VDB Entry
http://www.theregister.co.uk/2010/12/11/exim_code_execution_peril/
Source: af854a3a-2127-422b-91ae-364da2661108
Press/Media Coverage Third Party Advisory
http://www.ubuntu.com/usn/USN-1060-1
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.vupen.com/english/advisories/2010/3171
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Vendor Advisory
http://www.vupen.com/english/advisories/2010/3204
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Vendor Advisory
http://www.vupen.com/english/advisories/2011/0135
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.vupen.com/english/advisories/2011/0245
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.vupen.com/english/advisories/2011/0364
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
https://bugzilla.redhat.com/show_bug.cgi?id=662012
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking Patch

57 reference(s) from NVD

Quick Stats

CVSS v3 Score
7.8 / 10.0
EPSS (Exploit Probability)
4.0%
88th percentile
Exploitation Status
Actively Exploited
Remediation due: 2022-04-15

Weaknesses (CWE)

Affected Vendors

debian exim canonical opensuse