- Description
- lib-src/movemail.c in movemail in emacs 22 and 23 allows local users to read, modify, or delete arbitrary mailbox files via a symlink attack, related to improper file-permission checks.
- Source
- security@ubuntu.com
- NVD status
- Modified
CVSS 2.0
- Type
- Primary
- Base score
- 4.4
- Impact score
- 6.4
- Exploitability score
- 3.4
- Vector string
- AV:L/AC:M/Au:N/C:P/I:P/A:P
- nvd@nist.gov
- CWE-264
- Hype score
- Not currently trending
- Red HatNot vulnerable. This issues does not affect the versions of emacs or xemacs as shipped with Red Hat Enterprise Linux. The movemail utility in Red Hat Enterprise Linux does not have the setgid bit set, which is required for this flaw to be exploitable.
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:emacs:22.1:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "9ADF55EE-0F79-414A-B701-14DDA1C9C3B5"
},
{
"criteria": "cpe:2.3:a:gnu:emacs:22.2:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "37E5A757-C2C8-49D4-AFCD-156CCF4B7262"
},
{
"criteria": "cpe:2.3:a:gnu:emacs:22.3:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "F1D047EC-2354-430D-B44C-FE8574F7617B"
},
{
"criteria": "cpe:2.3:a:gnu:emacs:23.1:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "99B66AEA-D831-4A17-A7D6-4DEDA28985C2"
}
],
"operator": "OR"
}
]
}
]