CVE-2006-2607 Affecting cron package, versions <3.0pl1-64


medium

Snyk CVSS

    Attack Complexity Low
    Confidentiality High
    Integrity High
    Availability High

    Threat Intelligence

    EPSS 0.13% (49th percentile)
Expand this section
NVD
8.4 high

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-DEBIAN9-CRON-311950
  • published 25 May 2006
  • disclosed 25 May 2006

How to fix?

Upgrade Debian:9 cron to version 3.0pl1-64 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream cron package and not the cron package as distributed by Debian. See How to fix? for Debian:9 relevant fixed versions and status.

do_command.c in Vixie cron (vixie-cron) 4.1 does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or resource limits, as originally demonstrated by a program that exceeds the process limits as defined in /etc/security/limits.conf.