U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2010-4345

Change History

Modified Analysis by NIST 7/16/2024 1:57:37 PM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
     *cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
     *cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
     *cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
     *cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
     *cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
     *cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
Changed CPE Configuration
OR
     *cpe:2.3:a:exim:exim:2.10:*:*:*:*:*:*:*
     *cpe:2.3:a:exim:exim:2.11:*:*:*:*:*:*:*
     *cpe:2.3:a:exim:exim:2.12:*:*:*:*:*:*:*
     *cpe:2.3:a:exim:exim:3.00:*:*:*:*:*:*:*
     *cpe:2.3:a:exim:exim:3.01:*:*:*:*:*:*:*
     *cpe:2.3:a:exim:exim:3.02:*:*:*:*:*:*:*
     *cpe:2.3:a:exim:exim:3.03:*:*:*:*:*:*:*
     *cpe:2.3:a:exim:exim:3.10:*:*:*:*:*:*:*
     *cpe:2.3:a:exim:exim:3.11:*:*:*:*:*:*:*
     *cpe:2.3:a:exim:exim:3.12:*:*:*:*:*:*:*
     *cpe:2.3:a:exim:exim:3.13:*:*:*:*:*:*:*
     *cpe:2.3:a:exim:exim:3.14:*:*:*:*:*:*:*
     *cpe:2.3:a:exim:exim:3.15:*:*:*:*:*:*:*
     *cpe:2.3:a:exim:exim:3.16:*:*:*:*:*:*:*
     *cpe:2.3:a:exim:exim:3.20:*:*:*:*:*:*:*
     *cpe:2.3:a:exim:exim:3.21:*:*:*:*:*:*:*
     *cpe:2.3:a:exim:exim:3.22:*:*:*:*:*:*:*
     *cpe:2.3:a:exim:exim:3.30:*:*:*:*:*:*:*
     *cpe:2.3:a:exim:exim:3.31:*:*:*:*:*:*:*
     *cpe:2.3:a:exim:exim:3.32:*:*:*:*:*:*:*
     *cpe:2.3:a:exim:exim:3.33:*:*:*:*:*:*:*
     *cpe:2.3:a:exim:exim:3.34:*:*:*:*:*:*:*
     *cpe:2.3:a:exim:exim:3.35:*:*:*:*:*:*:*
     *cpe:2.3:a:exim:exim:3.36:*:*:*:*:*:*:*
     *cpe:2.3:a:exim:exim:4.00:*:*:*:*:*:*:*
     *cpe:2.3:a:exim:exim:4.01:*:*:*:*:*:*:*
     *cpe:2.3:a:exim:exim:4.02:*:*:*:*:*:*:*
     *cpe:2.3:a:exim:exim:4.03:*:*:*:*:*:*:*
     *cpe:2.3:a:exim:exim:4.04:*:*:*:*:*:*:*
     *cpe:2.3:a:exim:exim:4.05:*:*:*:*:*:*:*
     *cpe:2.3:a:exim:exim:4.10:*:*:*:*:*:*:*
     *cpe:2.3:a:exim:exim:4.11:*:*:*:*:*:*:*
     *cpe:2.3:a:exim:exim:4.12:*:*:*:*:*:*:*
     *cpe:2.3:a:exim:exim:4.14:*:*:*:*:*:*:*
     *cpe:2.3:a:exim:exim:4.20:*:*:*:*:*:*:*
     *cpe:2.3:a:exim:exim:4.21:*:*:*:*:*:*:*
     *cpe:2.3:a:exim:exim:4.22:*:*:*:*:*:*:*
     *cpe:2.3:a:exim:exim:4.23:*:*:*:*:*:*:*
     *cpe:2.3:a:exim:exim:4.24:*:*:*:*:*:*:*
     *cpe:2.3:a:exim:exim:4.30:*:*:*:*:*:*:*
     *cpe:2.3:a:exim:exim:4.31:*:*:*:*:*:*:*
     *cpe:2.3:a:exim:exim:4.32:*:*:*:*:*:*:*
     *cpe:2.3:a:exim:exim:4.33:*:*:*:*:*:*:*
     *cpe:2.3:a:exim:exim:4.34:*:*:*:*:*:*:*
     *cpe:2.3:a:exim:exim:4.40:*:*:*:*:*:*:*
     *cpe:2.3:a:exim:exim:4.41:*:*:*:*:*:*:*
     *cpe:2.3:a:exim:exim:4.42:*:*:*:*:*:*:*
     *cpe:2.3:a:exim:exim:4.43:*:*:*:*:*:*:*
     *cpe:2.3:a:exim:exim:4.44:*:*:*:*:*:*:*
     *cpe:2.3:a:exim:exim:4.50:*:*:*:*:*:*:*
     *cpe:2.3:a:exim:exim:4.51:*:*:*:*:*:*:*
     *cpe:2.3:a:exim:exim:4.52:*:*:*:*:*:*:*
     *cpe:2.3:a:exim:exim:4.53:*:*:*:*:*:*:*
     *cpe:2.3:a:exim:exim:4.54:*:*:*:*:*:*:*
     *cpe:2.3:a:exim:exim:4.60:*:*:*:*:*:*:*
     *cpe:2.3:a:exim:exim:4.61:*:*:*:*:*:*:*
     *cpe:2.3:a:exim:exim:4.62:*:*:*:*:*:*:*
     *cpe:2.3:a:exim:exim:4.63:*:*:*:*:*:*:*
     *cpe:2.3:a:exim:exim:4.64:*:*:*:*:*:*:*
     *cpe:2.3:a:exim:exim:4.65:*:*:*:*:*:*:*
     *cpe:2.3:a:exim:exim:4.66:*:*:*:*:*:*:*
     *cpe:2.3:a:exim:exim:4.67:*:*:*:*:*:*:*
     *cpe:2.3:a:exim:exim:4.68:*:*:*:*:*:*:*
     *cpe:2.3:a:exim:exim:4.69:*:*:*:*:*:*:*
     *cpe:2.3:a:exim:exim:4.70:*:*:*:*:*:*:*
     *cpe:2.3:a:exim:exim:4.71:*:*:*:*:*:*:*
     *cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:* versions up to (including) 4.72
OR
     *cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:* versions up to (including) 4.72
Added CVSS V3.1

								
							
							
						
NIST AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Added CWE

								
							
							
						
NIST NVD-CWE-noinfo
Removed CWE
NIST CWE-264

								
						
Changed Reference Type
http://bugs.exim.org/show_bug.cgi?id=1044 Patch
http://bugs.exim.org/show_bug.cgi?id=1044 Issue Tracking, Patch
Changed Reference Type
http://lists.exim.org/lurker/message/20101209.172233.abcba158.en.html Patch
http://lists.exim.org/lurker/message/20101209.172233.abcba158.en.html Mailing List, Patch
Changed Reference Type
http://lists.exim.org/lurker/message/20101210.164935.385e04d0.en.html No Types Assigned
http://lists.exim.org/lurker/message/20101210.164935.385e04d0.en.html Mailing List
Changed Reference Type
http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00003.html No Types Assigned
http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00003.html Mailing List, Third Party Advisory
Changed Reference Type
http://openwall.com/lists/oss-security/2010/12/10/1 No Types Assigned
http://openwall.com/lists/oss-security/2010/12/10/1 Mailing List
Changed Reference Type
http://secunia.com/advisories/42576 Vendor Advisory
http://secunia.com/advisories/42576 Broken Link, Vendor Advisory
Changed Reference Type
http://secunia.com/advisories/42930 No Types Assigned
http://secunia.com/advisories/42930 Broken Link
Changed Reference Type
http://secunia.com/advisories/43128 No Types Assigned
http://secunia.com/advisories/43128 Broken Link
Changed Reference Type
http://secunia.com/advisories/43243 No Types Assigned
http://secunia.com/advisories/43243 Broken Link
Changed Reference Type
http://www.cpanel.net/2010/12/critical-exim-security-update.html No Types Assigned
http://www.cpanel.net/2010/12/critical-exim-security-update.html Broken Link
Changed Reference Type
http://www.debian.org/security/2010/dsa-2131 No Types Assigned
http://www.debian.org/security/2010/dsa-2131 Mailing List, Third Party Advisory
Changed Reference Type
http://www.debian.org/security/2011/dsa-2154 No Types Assigned
http://www.debian.org/security/2011/dsa-2154 Mailing List, Third Party Advisory
Changed Reference Type
http://www.exim.org/lurker/message/20101207.215955.bb32d4f2.en.html Vendor Advisory
http://www.exim.org/lurker/message/20101207.215955.bb32d4f2.en.html Mailing List, Vendor Advisory
Changed Reference Type
http://www.kb.cert.org/vuls/id/758489 US Government Resource
http://www.kb.cert.org/vuls/id/758489 Third Party Advisory, US Government Resource
Changed Reference Type
http://www.metasploit.com/modules/exploit/unix/smtp/exim4_string_format No Types Assigned
http://www.metasploit.com/modules/exploit/unix/smtp/exim4_string_format Third Party Advisory
Changed Reference Type
http://www.openwall.com/lists/oss-security/2021/05/04/7 No Types Assigned
http://www.openwall.com/lists/oss-security/2021/05/04/7 Mailing List
Changed Reference Type
http://www.redhat.com/support/errata/RHSA-2011-0153.html No Types Assigned
http://www.redhat.com/support/errata/RHSA-2011-0153.html Broken Link
Changed Reference Type
http://www.securityfocus.com/archive/1/515172/100/0/threaded No Types Assigned
http://www.securityfocus.com/archive/1/515172/100/0/threaded Broken Link, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.securityfocus.com/bid/45341 No Types Assigned
http://www.securityfocus.com/bid/45341 Broken Link, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.securitytracker.com/id?1024859 No Types Assigned
http://www.securitytracker.com/id?1024859 Broken Link, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.theregister.co.uk/2010/12/11/exim_code_execution_peril/ No Types Assigned
http://www.theregister.co.uk/2010/12/11/exim_code_execution_peril/ Press/Media Coverage, Third Party Advisory
Changed Reference Type
http://www.ubuntu.com/usn/USN-1060-1 No Types Assigned
http://www.ubuntu.com/usn/USN-1060-1 Third Party Advisory
Changed Reference Type
http://www.vupen.com/english/advisories/2010/3171 Vendor Advisory
http://www.vupen.com/english/advisories/2010/3171 Broken Link, Vendor Advisory
Changed Reference Type
http://www.vupen.com/english/advisories/2010/3204 Vendor Advisory
http://www.vupen.com/english/advisories/2010/3204 Broken Link, Vendor Advisory
Changed Reference Type
http://www.vupen.com/english/advisories/2011/0135 No Types Assigned
http://www.vupen.com/english/advisories/2011/0135 Broken Link
Changed Reference Type
http://www.vupen.com/english/advisories/2011/0245 No Types Assigned
http://www.vupen.com/english/advisories/2011/0245 Broken Link
Changed Reference Type
http://www.vupen.com/english/advisories/2011/0364 No Types Assigned
http://www.vupen.com/english/advisories/2011/0364 Broken Link
Changed Reference Type
https://bugzilla.redhat.com/show_bug.cgi?id=662012 Patch
https://bugzilla.redhat.com/show_bug.cgi?id=662012 Issue Tracking, Patch