SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Generic)  >   Cron Vendors:   Vixie, Paul
Vixie Cron 'do_command.c' May Let Local Users Gain Elevated Privileges
SecurityTracker Alert ID:  1016480
SecurityTracker URL:  http://securitytracker.com/id/1016480
CVE Reference:   CVE-2006-2607   (Links to External Site)
Date:  Jul 12 2006
Impact:   Execution of arbitrary code via local system, Root access via local system

Version(s): 4.1
Description:   A vulnerability was reported in Vixie cron. A local user can obtain elevated privileges on the target system.

When the '/etc/security/limits.conf' file has been configured with limits for a user and that user has sufficient privileges to execute cron, the user can exceed the limits to execute arbitrary programs with root privileges. The 'do_command.c' code does not check the return code of a setuid call and may permit the command when it should not be permitted.

Roman Veretelnikov reported this vulnerability in January 2006.

Impact:   A local user can obtain elevated privileges on the target system.
Solution:   No solution was available at the time of this entry.
Cause:   Access control error, State error
Underlying OS:   Linux (Any), UNIX (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Jul 12 2006 (Red Hat Issues Fix) Vixie Cron 'do_command.c' May Let Local Users Gain Elevated Privileges   (bugzilla@redhat.com)
Red Hat has released a fix for Red Hat Enterprise Linux 4.



 Source Message Contents

Date:  May 25 2006 07:31PM
Subject:  rPSA-2006-0082-1 vixie-cron

rPath Security Advisory: 2006-0082-1
Published: 2006-05-25
Products: rPath Linux 1
Rating: Critical
Exposure Level Classification:
Local Root Deterministic Privilege Escalation
Updated Versions:
vixie-cron=/conary.rpath.com@rpl:devel//1/4.1-5.2-1

References:
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-xxxx-xxxx
http://bugs.rpath.com/show_bug.cgi?id=1166

Description:
In previous versions of the vixie-cron package, when the
/etc/security/limits.conf file has been set up with limits for
any user, and that user has permission to use the cron facility,
that user can use vixie-cron to run arbitrary programs as root by
exceeding the limits set in /etc/security/limits.conf.

By default, rPath Linux does not include any limits configured
in the /etc/security/limits.conf file. The /etc/security/limits.conf
file is provided by the pam:data component, so to determine whether
it has been changed in any way, run the command:

# conary verify pam:data | grep /etc/security/limits.conf
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC