CVE-2010-0825
Published Apr 5, 2010
Last updated 7 years ago
Overview
- Description
- lib-src/movemail.c in movemail in emacs 22 and 23 allows local users to read, modify, or delete arbitrary mailbox files via a symlink attack, related to improper file-permission checks.
- Source
- security@ubuntu.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.4
- Impact score
- 6.4
- Exploitability score
- 3.4
- Vector string
- AV:L/AC:M/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-264
Vendor comments
- Red HatNot vulnerable. This issues does not affect the versions of emacs or xemacs as shipped with Red Hat Enterprise Linux. The movemail utility in Red Hat Enterprise Linux does not have the setgid bit set, which is required for this flaw to be exploitable.
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:emacs:22.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9ADF55EE-0F79-414A-B701-14DDA1C9C3B5" }, { "criteria": "cpe:2.3:a:gnu:emacs:22.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "37E5A757-C2C8-49D4-AFCD-156CCF4B7262" }, { "criteria": "cpe:2.3:a:gnu:emacs:22.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F1D047EC-2354-430D-B44C-FE8574F7617B" }, { "criteria": "cpe:2.3:a:gnu:emacs:23.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "99B66AEA-D831-4A17-A7D6-4DEDA28985C2" } ], "operator": "OR" } ] } ]