High severity7.8CISA KEVNVD Advisory· Published Dec 14, 2010· Updated Apr 21, 2026
CVE-2010-4345
CVE-2010-4345
Description
Exim 4.72 and earlier allows local users to gain privileges by leveraging the ability of the exim user account to specify an alternate configuration file with a directive that contains arbitrary commands, as demonstrated by the spool_directory directive.
Affected products
10- cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*+ 4 more
- cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
29- bugs.exim.org/show_bug.cginvdIssue TrackingPatch
- lists.exim.org/lurker/message/20101209.172233.abcba158.en.htmlnvdMailing ListPatch
- bugzilla.redhat.com/show_bug.cginvdIssue TrackingPatch
- lists.opensuse.org/opensuse-security-announce/2010-12/msg00003.htmlnvdMailing ListThird Party Advisory
- secunia.com/advisories/42576nvdBroken LinkVendor Advisory
- www.debian.org/security/2010/dsa-2131nvdMailing ListThird Party Advisory
- www.debian.org/security/2011/dsa-2154nvdMailing ListThird Party Advisory
- www.exim.org/lurker/message/20101207.215955.bb32d4f2.en.htmlnvdMailing ListVendor Advisory
- www.kb.cert.org/vuls/id/758489nvdThird Party AdvisoryUS Government Resource
- www.metasploit.com/modules/exploit/unix/smtp/exim4_string_formatnvdThird Party Advisory
- www.securityfocus.com/archive/1/515172/100/0/threadednvdBroken LinkThird Party AdvisoryVDB Entry
- www.securityfocus.com/bid/45341nvdBroken LinkThird Party AdvisoryVDB Entry
- www.securitytracker.com/idnvdBroken LinkThird Party AdvisoryVDB Entry
- www.theregister.co.uk/2010/12/11/exim_code_execution_peril/nvdPress/Media CoverageThird Party Advisory
- www.ubuntu.com/usn/USN-1060-1nvdThird Party Advisory
- www.vupen.com/english/advisories/2010/3171nvdBroken LinkVendor Advisory
- www.vupen.com/english/advisories/2010/3204nvdBroken LinkVendor Advisory
- lists.exim.org/lurker/message/20101210.164935.385e04d0.en.htmlnvdMailing List
- openwall.com/lists/oss-security/2010/12/10/1nvdMailing List
- secunia.com/advisories/42930nvdBroken Link
- secunia.com/advisories/43128nvdBroken Link
- secunia.com/advisories/43243nvdBroken Link
- www.cpanel.net/2010/12/critical-exim-security-update.htmlnvdBroken Link
- www.openwall.com/lists/oss-security/2021/05/04/7nvdMailing List
- www.redhat.com/support/errata/RHSA-2011-0153.htmlnvdBroken Link
- www.vupen.com/english/advisories/2011/0135nvdBroken Link
- www.vupen.com/english/advisories/2011/0245nvdBroken Link
- www.vupen.com/english/advisories/2011/0364nvdBroken Link
- www.cisa.gov/known-exploited-vulnerabilities-catalognvdUS Government Resource
News mentions
0No linked articles in our index yet.