Lucene search

K
ubuntuUbuntuUSN-778-1
HistoryJun 01, 2009 - 12:00 a.m.

cron vulnerability

2009-06-0100:00:00
ubuntu.com
41

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

AI Score

6.5

Confidence

Low

EPSS

0.001

Percentile

48.7%

Releases

  • Ubuntu 9.04
  • Ubuntu 8.10
  • Ubuntu 8.04
  • Ubuntu 6.06

Packages

  • cron -

Details

It was discovered that cron did not properly check the return code of
the setgid() and initgroups() system calls. A local attacker could use
this to escalate group privileges. Please note that cron versions 3.0pl1-64
and later were already patched to address the more serious setuid() check
referred to by CVE-2006-2607.

OSVersionArchitecturePackageVersionFilename
Ubuntu9.04noarchcron< 3.0pl1-105ubuntu1.1UNKNOWN
Ubuntu8.10noarchcron< 3.0pl1-104+ubuntu5.1UNKNOWN
Ubuntu8.04noarchcron< 3.0pl1-100ubuntu2.1UNKNOWN
Ubuntu6.06noarchcron< 3.0pl1-92ubuntu1.1UNKNOWN

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

AI Score

6.5

Confidence

Low

EPSS

0.001

Percentile

48.7%