First published: Thu Jun 03 2010(Updated: )
Dan Rosenberg reported that when exim is used with a world-writable mail directory, with the sticky-bit set, local users could create hard-links to other non-root users' files in the mailbox storage directory, causing files to be overwritten upon mail delivery. This could be used to create a denial of service condition or potentially escalate privileges to those of targeted users. Further information is available from the upstream bug report [1] and this has been fixed upstream in exim 4.72 [2]. [1] <a href="http://bugs.exim.org/show_bug.cgi?id=988">http://bugs.exim.org/show_bug.cgi?id=988</a> [2] <a href="http://vcs.exim.org/viewvc/exim/exim-src/src/transports/appendfile.c?r1=1.24&r2=1.25">http://vcs.exim.org/viewvc/exim/exim-src/src/transports/appendfile.c?r1=1.24&r2=1.25</a> The /var/spool/mail directory on Red Hat Enterprise Linux and Fedora is mode 0755 and owned root:mail. As a result, this is not exploitable by default.
Affected Software | Affected Version | How to fix |
---|---|---|
sa-exim | <4.72 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.