SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Generic)  >   Cron Vendors:   Vixie, Paul
Vixie Cron 'do_command.c' May Let Local Users Gain Elevated Privileges
SecurityTracker Alert ID:  1016480
SecurityTracker URL:  http://securitytracker.com/id/1016480
CVE Reference:   CVE-2006-2607   (Links to External Site)
Date:  Jul 12 2006
Impact:   Execution of arbitrary code via local system, Root access via local system

Version(s): 4.1
Description:   A vulnerability was reported in Vixie cron. A local user can obtain elevated privileges on the target system.

When the '/etc/security/limits.conf' file has been configured with limits for a user and that user has sufficient privileges to execute cron, the user can exceed the limits to execute arbitrary programs with root privileges. The 'do_command.c' code does not check the return code of a setuid call and may permit the command when it should not be permitted.

Roman Veretelnikov reported this vulnerability in January 2006.

Impact:   A local user can obtain elevated privileges on the target system.
Solution:   No solution was available at the time of this entry.
Cause:   Access control error, State error
Underlying OS:  Linux (Any), UNIX (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Jul 12 2006 (Red Hat Issues Fix) Vixie Cron 'do_command.c' May Let Local Users Gain Elevated Privileges
Red Hat has released a fix for Red Hat Enterprise Linux 4.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2016, SecurityGlobal.net LLC