[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2006-2607Date: (C)2006-05-25   (M)2023-12-22


do_command.c in Vixie cron (vixie-cron) 4.1 does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or resource limits, as originally demonstrated by a program that exceeds the process limits as defined in /etc/security/limits.conf.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 7.2
Exploit Score: 3.9
Impact Score: 10.0
 
CVSS V2 Metrics:
Access Vector: LOCAL
Access Complexity: LOW
Authentication: NONE
Confidentiality: COMPLETE
Integrity: COMPLETE
Availability: COMPLETE
  
Reference:
SECTRACK-1016480
BID-18108
http://www.securityfocus.com/archive/1/435033/100/0/threaded
SECUNIA-20380
SECUNIA-20388
SECUNIA-20616
SECUNIA-21032
SECUNIA-21702
SECUNIA-35318
ADV-2006-2075
GLSA-200606-07
RHSA-2006:0539
SUSE-SA:2006:027
USN-778-1
http://bugs.gentoo.org/show_bug.cgi?id=134194
http://support.avaya.com/elmodocs2/security/ASA-2006-168.htm
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=178431
oval:org.mitre.oval:def:10213
vixie-cron-docommand-gain-privilege(26691)

OVAL    1
oval:org.secpod.oval:def:700315

© SecPod Technologies