Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2011-0017

Опубликовано: 25 янв. 2011
Источник: redhat
CVSS2: 4
EPSS Низкий

Описание

The open_log function in log.c in Exim 4.72 and earlier does not check the return value from (1) setuid or (2) setgid system calls, which allows local users to append log data to arbitrary files via a symlink attack.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 4eximWill not fix
Red Hat Enterprise Linux 5eximWill not fix

Показывать по

Дополнительная информация

Статус:

Low

EPSS

Процентиль: 32%
0.00121
Низкий

4 Medium

CVSS2

Связанные уязвимости

ubuntu
около 15 лет назад

The open_log function in log.c in Exim 4.72 and earlier does not check the return value from (1) setuid or (2) setgid system calls, which allows local users to append log data to arbitrary files via a symlink attack.

nvd
около 15 лет назад

The open_log function in log.c in Exim 4.72 and earlier does not check the return value from (1) setuid or (2) setgid system calls, which allows local users to append log data to arbitrary files via a symlink attack.

debian
около 15 лет назад

The open_log function in log.c in Exim 4.72 and earlier does not check ...

github
больше 3 лет назад

The open_log function in log.c in Exim 4.72 and earlier does not check the return value from (1) setuid or (2) setgid system calls, which allows local users to append log data to arbitrary files via a symlink attack.

EPSS

Процентиль: 32%
0.00121
Низкий

4 Medium

CVSS2