[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249966

 
 

909

 
 

195636

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-2154-1 exim4 -- privilege escalation

ID: oval:org.secpod.oval:def:600545Date: (C)2011-07-05   (M)2023-02-20
Class: PATCHFamily: unix




A design flaw in exim4 allowed the loal Debian-exim user to obtain root privileges by specifying an alternate configuration file using the -C option or by using the macro override facility . Unfortunately, fixing this vulnerability is not possible without some changes in exim4"s behvaviour. If you use the -C or -D options or use the system filter facility, you should evaluate the changes carefully and adjust your configuration accordingly. The Debian default configuration is not affected by the changes. The detailed list of changes is described in the NEWS.Debian file in the packages. The relevant sections are also reproduced below. In addition to that, missing error handling for the setuid/setgid system calls allowed the Debian-exim user to cause root to append log data to arbitrary files .

Platform:
Debian 5.0
Product:
exim4
Reference:
DSA-2154-1
CVE-2010-4345
CVE-2011-0017
CVE    2
CVE-2011-0017
CVE-2010-4345
CPE    1
cpe:/o:debian:debian_linux:5.0

© SecPod Technologies