The open_log function in log.c in Exim 4.72 and earlier does not check the return value from (1) setuid or (2) setgid system calls, which allows local users to append log data to arbitrary files via a symlink attack.
http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html
http://secunia.com/advisories/43101
http://secunia.com/advisories/43128
http://secunia.com/advisories/43243
https://exchange.xforce.ibmcloud.com/vulnerabilities/65028
http://www.debian.org/security/2011/dsa-2154
http://www.ubuntu.com/usn/USN-1060-1
http://www.vupen.com/english/advisories/2011/0224
http://www.vupen.com/english/advisories/2011/0245
Published: 2011-02-02
Base Score: 6.9
Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C
Severity: Medium