{"api_version":"1","generated_at":"2026-05-05T15:54:24+00:00","cve":"CVE-2017-10140","urls":{"html":"https://cve.report/CVE-2017-10140","api":"https://cve.report/api/cve/CVE-2017-10140.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2017-10140","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2017-10140"},"summary":{"title":"CVE-2017-10140","description":"Postfix before 2.11.10, 3.0.x before 3.0.10, 3.1.x before 3.1.6, and 3.2.x before 3.2.2 might allow local users to gain privileges by leveraging undocumented functionality in Berkeley DB 2.x and later, related to reading settings from DB_CONFIG in the current directory.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2018-04-16 17:29:00","updated_at":"2020-07-15 18:15:00"},"problem_types":["NVD-CWE-noinfo"],"metrics":[],"references":[{"url":"https://access.redhat.com/errata/RHSA-2019:0366","name":"RHSA-2019:0366","refsource":"REDHAT","tags":["Third Party Advisory"],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.oracle.com/security-alerts/cpujul2020.html","name":"https://www.oracle.com/security-alerts/cpujul2020.html","refsource":"MISC","tags":[],"title":"Oracle Critical Patch Update Advisory - July 2020","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.postfix.org/announcements/postfix-3.2.2.html","name":"http://www.postfix.org/announcements/postfix-3.2.2.html","refsource":"CONFIRM","tags":["Vendor Advisory"],"title":"Postfix stable release 3.2.2 and legacy releases 3.1.6, 3.0.10\nand 2.11.10","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://seclists.org/oss-sec/2017/q3/285","name":"[oss-sec] 20170611 Berkeley DB reads DB_CONFIG from cwd","refsource":"MLIST","tags":["Exploit","Mailing List","Third Party Advisory"],"title":"oss-sec: Re: Berkeley DB reads DB_CONFIG from cwd","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2017-10140","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-10140","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2017","cve_id":"10140","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"postfix","cpe5":"postfix","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"10140","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"postfix","cpe5":"postfix","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2017-10140","qid":"354796","title":"Amazon Linux Security Advisory for libdb : ALAS2-2023-1965"},{"cve":"CVE-2017-10140","qid":"354863","title":"Amazon Linux Security Advisory for db4 : ALAS-2023-1726"},{"cve":"CVE-2017-10140","qid":"355069","title":"Amazon Linux Security Advisory for db4 : AL2012-2023-393"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2017-10140","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Postfix before 2.11.10, 3.0.x before 3.0.10, 3.1.x before 3.1.6, and 3.2.x before 3.2.2 might allow local users to gain privileges by leveraging undocumented functionality in Berkeley DB 2.x and later, related to reading settings from DB_CONFIG in the current directory."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"[oss-sec] 20170611 Berkeley DB reads DB_CONFIG from cwd","refsource":"MLIST","url":"http://seclists.org/oss-sec/2017/q3/285"},{"name":"RHSA-2019:0366","refsource":"REDHAT","url":"https://access.redhat.com/errata/RHSA-2019:0366"},{"url":"https://www.oracle.com/security-alerts/cpujul2020.html","refsource":"MISC","name":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"name":"http://www.postfix.org/announcements/postfix-3.2.2.html","refsource":"CONFIRM","url":"http://www.postfix.org/announcements/postfix-3.2.2.html"}]}},"nvd":{"publishedDate":"2018-04-16 17:29:00","lastModifiedDate":"2020-07-15 18:15:00","problem_types":["NVD-CWE-noinfo"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":4.6},"severity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:postfix:postfix:*:*:*:*:*:*:*:*","versionStartIncluding":"3.2.0","versionEndExcluding":"3.2.2","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:postfix:postfix:*:*:*:*:*:*:*:*","versionStartIncluding":"3.1.0","versionEndExcluding":"3.1.6","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:postfix:postfix:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0.0","versionEndExcluding":"3.0.10","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:postfix:postfix:*:*:*:*:*:*:*:*","versionEndExcluding":"2.11.10","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2017","CveId":"10140","Ordinal":"106982","Title":"CVE-2017-10140","CVE":"CVE-2017-10140","Year":"2017"},"notes":[{"CveYear":"2017","CveId":"10140","Ordinal":"1","NoteData":"Postfix before 2.11.10, 3.0.x before 3.0.10, 3.1.x before 3.1.6, and 3.2.x before 3.2.2 might allow local users to gain privileges by leveraging undocumented functionality in Berkeley DB 2.x and later, related to reading settings from DB_CONFIG in the current directory.","Type":"Description","Title":null},{"CveYear":"2017","CveId":"10140","Ordinal":"2","NoteData":"2018-04-16","Type":"Other","Title":"Published"},{"CveYear":"2017","CveId":"10140","Ordinal":"3","NoteData":"2020-07-15","Type":"Other","Title":"Modified"}]}}}