Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   


Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker

Category:   Application (Generic)  >   Cron Vendors:   Vixie, Paul
Vixie Cron 'do_command.c' May Let Local Users Gain Elevated Privileges
SecurityTracker Alert ID:  1016480
SecurityTracker URL:
CVE Reference:   CVE-2006-2607   (Links to External Site)
Date:  Jul 12 2006
Impact:   Execution of arbitrary code via local system, Root access via local system

Version(s): 4.1
Description:   A vulnerability was reported in Vixie cron. A local user can obtain elevated privileges on the target system.

When the '/etc/security/limits.conf' file has been configured with limits for a user and that user has sufficient privileges to execute cron, the user can exceed the limits to execute arbitrary programs with root privileges. The 'do_command.c' code does not check the return code of a setuid call and may permit the command when it should not be permitted.

Roman Veretelnikov reported this vulnerability in January 2006.

Impact:   A local user can obtain elevated privileges on the target system.
Solution:   No solution was available at the time of this entry.
Cause:   Access control error, State error
Underlying OS:   Linux (Any), UNIX (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Jul 12 2006 (Red Hat Issues Fix) Vixie Cron 'do_command.c' May Let Local Users Gain Elevated Privileges   (
Red Hat has released a fix for Red Hat Enterprise Linux 4.

 Source Message Contents

Date:  May 25 2006 07:31PM
Subject:  rPSA-2006-0082-1 vixie-cron

rPath Security Advisory: 2006-0082-1
Published: 2006-05-25
Products: rPath Linux 1
Rating: Critical
Exposure Level Classification:
Local Root Deterministic Privilege Escalation
Updated Versions:


In previous versions of the vixie-cron package, when the
/etc/security/limits.conf file has been set up with limits for
any user, and that user has permission to use the cron facility,
that user can use vixie-cron to run arbitrary programs as root by
exceeding the limits set in /etc/security/limits.conf.

By default, rPath Linux does not include any limits configured
in the /etc/security/limits.conf file. The /etc/security/limits.conf
file is provided by the pam:data component, so to determine whether
it has been changed in any way, run the command:

# conary verify pam:data | grep /etc/security/limits.conf

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

Copyright 2015, LLC