CWE
264
Advisory Published
Updated

CVE-2010-0825

First published: Mon Apr 05 2010(Updated: )

lib-src/movemail.c in movemail in emacs 22 and 23 allows local users to read, modify, or delete arbitrary mailbox files via a symlink attack, related to improper file-permission checks.

Credit: security@ubuntu.com

Affected SoftwareAffected VersionHow to fix
GNU Emacs=22.1
GNU Emacs=23.1
GNU Emacs=22.3
GNU Emacs=22.2

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2010-0825?

    CVE-2010-0825 has been classified as a moderate severity vulnerability due to the potential for local users to exploit it.

  • How do I fix CVE-2010-0825?

    To fix CVE-2010-0825, update to a patched version of GNU Emacs that addresses the file-permission checks.

  • What systems are affected by CVE-2010-0825?

    CVE-2010-0825 affects GNU Emacs versions 22.1, 22.2, 22.3, and 23.1.

  • What kind of attack does CVE-2010-0825 allow?

    CVE-2010-0825 allows for a symlink attack that could let local users read, modify, or delete mailbox files.

  • Is CVE-2010-0825 a remote vulnerability?

    No, CVE-2010-0825 is a local vulnerability, meaning it requires local access to exploit.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203