Vulnerability Details : CVE-2010-1123
Chip Salzenberg Deliver does not properly associate a lockfile with the user who created the file, which allows local users to cause a denial of service (blockage of incoming e-mail) by creating lockfiles for arbitrary mailboxes.
Vulnerability category: Denial of service
Exploit prediction scoring system (EPSS) score for CVE-2010-1123
Probability of exploitation activity in the next 30 days: 0.04%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 6 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2010-1123
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
2.1
|
LOW | AV:L/AC:L/Au:N/C:N/I:N/A:P |
3.9
|
2.9
|
NIST |
CWE ids for CVE-2010-1123
-
The product contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.Assigned by: nvd@nist.gov (Primary)
References for CVE-2010-1123
-
http://www.securityfocus.com/archive/1/510306/100/0/threaded
SecurityFocus
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/57558
Deliver lockfile denial of service CVE-2010-1123 Vulnerability Report
-
http://www.securityfocus.com/bid/38924
Deliver Local Privilege Escalation and Denial of Service Vulnerabilities
Products affected by CVE-2010-1123
- cpe:2.3:a:chip_salzenberg:deliver:2.1.14:*:*:*:*:*:*:*