CVE-2010-2023Race Condition in Exim

Severity
4.4MEDIUMNVD
CISA7.8
EPSS
0.2%
top 54.13%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJun 7
Latest updateSep 15

Description

transports/appendfile.c in Exim before 4.72, when a world-writable sticky-bit mail directory is used, does not verify the st_nlink field of mailbox files, which allows local users to cause a denial of service or possibly gain privileges by creating a hard link to another user's file.

CVSS vector

AV:L/AC:M/C:P/I:P/A:PExploitability: 3.4 | Impact: 6.4

Affected Packages2 packages

debiandebian/exim4< exim4 4.72-1 (bookworm)
NVDexim/exim4.71+32

Patches

🔴Vulnerability Details

3
GHSA
GHSA-qrcj-mq48-333m: transports/appendfile2022-05-14
CVEList
CVE-2010-2023: transports/appendfile2010-06-07
OSV
CVE-2010-2023: transports/appendfile2010-06-07

📋Vendor Advisories

6
Red Hat
kernel: nubus: Partially revert proc_create_single_data() conversion2025-09-15
Red Hat
vim: use after free2023-10-10
CISA
Linux Kernel Improper Input Validation Vulnerability2023-05-12
Ubuntu
Exim vulnerabilities2011-02-10
Red Hat
exim: hard-link following vulnerability in mailbox handling2010-06-03

💬Community

2
Bugzilla
CVE-2010-4554 CVE-2010-4555 CVE-2011-2023 squirrelmail various flaws [epel-6]2011-07-12
Bugzilla
CVE-2010-2023 exim: hard-link following vulnerability in mailbox handling2010-06-03