7.2
CVSSv2

CVE-2006-2607

Published: 25/05/2006 Updated: 18/10/2018
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
VMScore: 641
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

do_command.c in Vixie cron (vixie-cron) 4.1 does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or resource limits, as originally demonstrated by a program that exceeds the process limits as defined in /etc/security/limits.conf.

Vulnerable Product Search on Vulmon Subscribe to Product

paul vixie vixie cron 4.1

Vendor Advisories

Debian Bug report logs - #528434 cron: Incomplete fix for CVE-2006-2607 (setgid() and initgroups() not checked) Package: cron; Maintainer for cron is Javier Fernández-Sanguino Peña <jfs@debianorg>; Source for cron is src:cron (PTS, buildd, popcon) Reported by: Jamie Strandboge <jamie@ubuntucom> Date: Tue, 12 May ...
It was discovered that cron did not properly check the return code of the setgid() and initgroups() system calls A local attacker could use this to escalate group privileges Please note that cron versions 30pl1-64 and later were already patched to address the more serious setuid() check referred to by CVE-2006-2607 ...