Vulnerability Details : CVE-2010-0825
lib-src/movemail.c in movemail in emacs 22 and 23 allows local users to read, modify, or delete arbitrary mailbox files via a symlink attack, related to improper file-permission checks.
Products affected by CVE-2010-0825
- cpe:2.3:a:gnu:emacs:22.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:emacs:22.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:emacs:22.3:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:emacs:23.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2010-0825
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 6 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2010-0825
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.4
|
MEDIUM | AV:L/AC:M/Au:N/C:P/I:P/A:P |
3.4
|
6.4
|
NIST |
CWE ids for CVE-2010-0825
-
Assigned by: nvd@nist.gov (Primary)
Vendor statements for CVE-2010-0825
-
Red Hat 2010-04-06Not vulnerable. This issues does not affect the versions of emacs or xemacs as shipped with Red Hat Enterprise Linux. The movemail utility in Red Hat Enterprise Linux does not have the setgid bit set, which is required for this flaw to be exploitable.
References for CVE-2010-0825
-
http://www.vupen.com/english/advisories/2010/0734
Webmail | OVH- OVHVendor Advisory
-
https://bugs.launchpad.net/ubuntu/+bug/531569
Bug #531569 “Emacs movemail race condition” : Bugs : emacs22 package : Ubuntu
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/57457
Emacs email helper symlink CVE-2010-0825 Vulnerability Report
-
http://www.mandriva.com/security/advisories?name=MDVSA-2010:083
mandriva.com
-
http://www.ubuntu.com/usn/USN-919-1
USN-919-1: Emacs vulnerability | Ubuntu security notices
-
http://www.vupen.com/english/advisories/2010/0952
Webmail | OVH- OVH
Jump to