fkie_cve-2014-2972
Vulnerability from fkie_nvd
Published
2014-09-04 17:55
Modified
2024-11-21 02:07
Severity ?
Summary
expand.c in Exim before 4.83 expands mathematical comparisons twice, which allows local users to gain privileges and execute arbitrary commands via a crafted lookup value.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
exim | exim | * | |
exim | exim | 4.00 | |
exim | exim | 4.01 | |
exim | exim | 4.02 | |
exim | exim | 4.03 | |
exim | exim | 4.04 | |
exim | exim | 4.05 | |
exim | exim | 4.10 | |
exim | exim | 4.11 | |
exim | exim | 4.12 | |
exim | exim | 4.14 | |
exim | exim | 4.20 | |
exim | exim | 4.21 | |
exim | exim | 4.22 | |
exim | exim | 4.23 | |
exim | exim | 4.24 | |
exim | exim | 4.30 | |
exim | exim | 4.31 | |
exim | exim | 4.32 | |
exim | exim | 4.33 | |
exim | exim | 4.34 | |
exim | exim | 4.40 | |
exim | exim | 4.41 | |
exim | exim | 4.42 | |
exim | exim | 4.43 | |
exim | exim | 4.44 | |
exim | exim | 4.50 | |
exim | exim | 4.51 | |
exim | exim | 4.52 | |
exim | exim | 4.53 | |
exim | exim | 4.54 | |
exim | exim | 4.60 | |
exim | exim | 4.61 | |
exim | exim | 4.62 | |
exim | exim | 4.63 | |
exim | exim | 4.64 | |
exim | exim | 4.65 | |
exim | exim | 4.66 | |
exim | exim | 4.67 | |
exim | exim | 4.68 | |
exim | exim | 4.69 | |
exim | exim | 4.70 | |
exim | exim | 4.71 | |
exim | exim | 4.72 | |
exim | exim | 4.73 | |
exim | exim | 4.74 | |
exim | exim | 4.75 | |
exim | exim | 4.76 | |
exim | exim | 4.77 | |
exim | exim | 4.80 | |
exim | exim | 4.80.1 | |
exim | exim | 4.82 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*", "matchCriteriaId": "BC7FB12D-A0E0-4DF2-9673-3635404D7EAB", "versionEndIncluding": "4.82.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:exim:exim:4.00:*:*:*:*:*:*:*", "matchCriteriaId": "92A7C49F-8826-47A5-BA9E-28472DFC5EFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:exim:exim:4.01:*:*:*:*:*:*:*", "matchCriteriaId": "52B3A794-43C7-4071-8E5A-EA209903165F", "vulnerable": true }, { "criteria": "cpe:2.3:a:exim:exim:4.02:*:*:*:*:*:*:*", "matchCriteriaId": "84DBC4E0-608F-40AA-AE30-D40D72F9BED4", "vulnerable": true }, { "criteria": "cpe:2.3:a:exim:exim:4.03:*:*:*:*:*:*:*", "matchCriteriaId": "71998344-4AC0-473F-980C-D8D0077E19A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:exim:exim:4.04:*:*:*:*:*:*:*", "matchCriteriaId": "42DA6BCE-7F17-4426-B514-3D50C764F4C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:exim:exim:4.05:*:*:*:*:*:*:*", "matchCriteriaId": "032862E6-F4CB-4E0E-93CA-0663E8536A1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:exim:exim:4.10:*:*:*:*:*:*:*", "matchCriteriaId": "0EC43E6B-2DA9-496E-BAD2-04FF4C3A53FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:exim:exim:4.11:*:*:*:*:*:*:*", "matchCriteriaId": "9FF31403-56FE-48D4-A93C-91B4DC89489B", "vulnerable": true }, { "criteria": "cpe:2.3:a:exim:exim:4.12:*:*:*:*:*:*:*", "matchCriteriaId": "CB5A240D-CA4D-4929-BA60-DBE621A4E6F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:exim:exim:4.14:*:*:*:*:*:*:*", "matchCriteriaId": "6BE1A094-2760-49CA-84A8-84B19BE2BE59", "vulnerable": true }, { "criteria": "cpe:2.3:a:exim:exim:4.20:*:*:*:*:*:*:*", "matchCriteriaId": "04C4B45D-A0AC-42B3-99D7-91F7B8D15B69", "vulnerable": true }, { "criteria": "cpe:2.3:a:exim:exim:4.21:*:*:*:*:*:*:*", "matchCriteriaId": "ED822CDF-C94B-4A16-BEEB-FECE51CBB744", "vulnerable": true }, { "criteria": "cpe:2.3:a:exim:exim:4.22:*:*:*:*:*:*:*", "matchCriteriaId": "B52A1ECA-44CC-4DDE-B1AD-25AE27605317", "vulnerable": true }, { "criteria": "cpe:2.3:a:exim:exim:4.23:*:*:*:*:*:*:*", "matchCriteriaId": "3E7D5D6F-8FDB-4AC2-A4D9-16E632AC8EAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:exim:exim:4.24:*:*:*:*:*:*:*", "matchCriteriaId": "A4FEC2B4-BD68-428E-91BC-BC85F72E3BE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:exim:exim:4.30:*:*:*:*:*:*:*", "matchCriteriaId": "23EEBB47-2495-4FDB-9A55-415DA69392E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:exim:exim:4.31:*:*:*:*:*:*:*", "matchCriteriaId": "D4A8E154-32CC-4665-82A0-1DE7A51B2435", "vulnerable": true }, { "criteria": "cpe:2.3:a:exim:exim:4.32:*:*:*:*:*:*:*", "matchCriteriaId": "4B594190-DF8F-45AE-8579-BD7B4568606F", "vulnerable": true }, { "criteria": "cpe:2.3:a:exim:exim:4.33:*:*:*:*:*:*:*", "matchCriteriaId": "BD2D8712-4DF9-4A73-93A7-7719C3502E18", "vulnerable": true }, { "criteria": "cpe:2.3:a:exim:exim:4.34:*:*:*:*:*:*:*", "matchCriteriaId": "2D9DF054-4CBF-4BA7-9A42-5627DC4B6A68", "vulnerable": true }, { "criteria": "cpe:2.3:a:exim:exim:4.40:*:*:*:*:*:*:*", "matchCriteriaId": "B13E6533-BEB9-4082-9063-7E3CCBF4C36C", "vulnerable": true }, { "criteria": "cpe:2.3:a:exim:exim:4.41:*:*:*:*:*:*:*", "matchCriteriaId": "879B9641-3245-4CF7-912A-FD21372F46F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:exim:exim:4.42:*:*:*:*:*:*:*", "matchCriteriaId": "A91CA841-BBCA-4EF9-BC00-478A18797941", "vulnerable": true }, { "criteria": "cpe:2.3:a:exim:exim:4.43:*:*:*:*:*:*:*", "matchCriteriaId": "EEA3F58C-3EF2-48B9-9171-7EFE72B1A3DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:exim:exim:4.44:*:*:*:*:*:*:*", "matchCriteriaId": "AFB37C45-54E7-4E91-8E6D-0A3E764E1702", "vulnerable": true }, { "criteria": "cpe:2.3:a:exim:exim:4.50:*:*:*:*:*:*:*", "matchCriteriaId": "31CBE3C0-4918-4FA6-B1E7-6336913EF8D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:exim:exim:4.51:*:*:*:*:*:*:*", "matchCriteriaId": "FC45BCE0-F190-4050-8B3B-869D0C1033AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:exim:exim:4.52:*:*:*:*:*:*:*", "matchCriteriaId": "6FD0E5A4-3FCB-46C1-A709-CA15D96FA9B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:exim:exim:4.53:*:*:*:*:*:*:*", "matchCriteriaId": "D3335C80-97AE-42DB-B125-0D3FA57D8317", "vulnerable": true }, { "criteria": "cpe:2.3:a:exim:exim:4.54:*:*:*:*:*:*:*", "matchCriteriaId": "0F83560A-BDD7-456D-846C-D1DAF5C9DA64", "vulnerable": true }, { "criteria": "cpe:2.3:a:exim:exim:4.60:*:*:*:*:*:*:*", "matchCriteriaId": "22B9FD06-13E3-47CA-AB67-691DC3A9C330", "vulnerable": true }, { "criteria": "cpe:2.3:a:exim:exim:4.61:*:*:*:*:*:*:*", "matchCriteriaId": "EE2A81F2-3E53-4A31-BCC6-BDC0E1B62CC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:exim:exim:4.62:*:*:*:*:*:*:*", "matchCriteriaId": "2A03C071-87BF-4D5E-ABED-472ABAEFAC71", "vulnerable": true }, { "criteria": "cpe:2.3:a:exim:exim:4.63:*:*:*:*:*:*:*", "matchCriteriaId": "D1D96C53-989C-42C8-9E71-A206B78ED55A", "vulnerable": true }, { "criteria": "cpe:2.3:a:exim:exim:4.64:*:*:*:*:*:*:*", "matchCriteriaId": "30190EAB-7140-4E0A-B7A5-8FA8BD0749C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:exim:exim:4.65:*:*:*:*:*:*:*", "matchCriteriaId": "E0BD63C5-C916-4D7D-AE81-7B9676FC0951", "vulnerable": true }, { "criteria": "cpe:2.3:a:exim:exim:4.66:*:*:*:*:*:*:*", "matchCriteriaId": "CCD8FE2F-8D53-407A-BB83-EB7725456D71", "vulnerable": true }, { "criteria": "cpe:2.3:a:exim:exim:4.67:*:*:*:*:*:*:*", "matchCriteriaId": "162F5CB4-1931-4236-8519-DD63A98BCEE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:exim:exim:4.68:*:*:*:*:*:*:*", "matchCriteriaId": "9EF06704-E078-42FA-89DA-7BCA169D0E5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:exim:exim:4.69:*:*:*:*:*:*:*", "matchCriteriaId": "B8F2CB6E-1ED1-4E56-9532-30D2BA6A53DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:exim:exim:4.70:*:*:*:*:*:*:*", "matchCriteriaId": "452E9C94-B7FF-40A9-A7F9-FC38824F6135", "vulnerable": true }, { "criteria": "cpe:2.3:a:exim:exim:4.71:*:*:*:*:*:*:*", "matchCriteriaId": "A8EB3709-D51F-46D1-99B8-CFB4C2275077", "vulnerable": true }, { "criteria": "cpe:2.3:a:exim:exim:4.72:*:*:*:*:*:*:*", "matchCriteriaId": "CBDB2156-072B-4392-9DC8-266FF1B8C7A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:exim:exim:4.73:*:*:*:*:*:*:*", "matchCriteriaId": "02F8A053-4578-4C45-A193-C188E45ED010", "vulnerable": true }, { "criteria": "cpe:2.3:a:exim:exim:4.74:*:*:*:*:*:*:*", "matchCriteriaId": "A5DC11D6-F67F-40A8-B8BF-2E76DD2F9091", "vulnerable": true }, { "criteria": "cpe:2.3:a:exim:exim:4.75:*:*:*:*:*:*:*", "matchCriteriaId": "5854CAF2-1587-4B91-9F9B-E2C57C22C426", "vulnerable": true }, { "criteria": "cpe:2.3:a:exim:exim:4.76:*:*:*:*:*:*:*", "matchCriteriaId": "24D504C3-139D-4627-BD72-B6B46B360CE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:exim:exim:4.77:*:*:*:*:*:*:*", "matchCriteriaId": "FF796BE5-380B-4DBF-A4FF-4CDF98B69C97", "vulnerable": true }, { "criteria": "cpe:2.3:a:exim:exim:4.80:*:*:*:*:*:*:*", "matchCriteriaId": "6526E201-30CC-4C12-B2B4-06EBA663D39F", "vulnerable": true }, { "criteria": "cpe:2.3:a:exim:exim:4.80.1:*:*:*:*:*:*:*", "matchCriteriaId": "F02038FF-F2B1-4DE2-A7DC-7C56C5CACC47", "vulnerable": true }, { "criteria": "cpe:2.3:a:exim:exim:4.82:*:*:*:*:*:*:*", "matchCriteriaId": "EF05D34C-6245-4264-8D31-6582A15D290E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "expand.c in Exim before 4.83 expands mathematical comparisons twice, which allows local users to gain privileges and execute arbitrary commands via a crafted lookup value." }, { "lang": "es", "value": "expand.c en Exim anterior a 4.83 expande las comparaciones matem\u00e1ticas dos veces, lo que permite a usuarios locales ganar privilegios y ejecutar comandos arbitrarios a trav\u00e9s de un valor lookup maniulado." } ], "id": "CVE-2014-2972", "lastModified": "2024-11-21T02:07:15.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-09-04T17:55:05.373", "references": [ { "source": "cret@cert.org", "url": "http://git.exim.org/exim.git/commitdiff/7685ce68148a083d7759e78d01aa5198fc099c44" }, { "source": "cret@cert.org", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136251.html" }, { "source": "cret@cert.org", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136264.html" }, { "source": "cret@cert.org", "url": "http://www.ubuntu.com/usn/USN-2933-1" }, { "source": "cret@cert.org", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1122552" }, { "source": "cret@cert.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://lists.exim.org/lurker/message/20140722.145949.42c043f5.en.html" }, { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "https://lists.exim.org/lurker/message/20140722.152452.d6c019e8.en.html" }, { "source": "cret@cert.org", "url": "https://security.gentoo.org/glsa/201607-12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://git.exim.org/exim.git/commitdiff/7685ce68148a083d7759e78d01aa5198fc099c44" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136251.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136264.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2933-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1122552" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://lists.exim.org/lurker/message/20140722.145949.42c043f5.en.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://lists.exim.org/lurker/message/20140722.152452.d6c019e8.en.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201607-12" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.