Re: Vulnerability in vixie cron?

看板FB_security作者時間20年前 (2006/07/18 20:23), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串2/3 (看更多)
Oliver Fromme <olli@lurza.secnetix.de> writes: > Recently there have been advisories and patches for > SuSE and RedHat (and probably a few others) regarding > a vulnerability in Vixie Cron. The details say that > there's insufficient checking of the return value of > setuid, which can lead to priviledge escalation and > lets users run cron jobs with root priviledges. > > As far as I know, FreBSD also uses Vixie Cron (at least > the cron(8) manpage says so). However, I haven't seen > any FreeBSD advisory regarding this, so I wonder if > FreeBSD's cron isn't affected for some reason? > > Any information would be appreciated. It looks to me like this wasn't exploitable in a default configuration anyway, but it was fixed on 1 June in HEAD and on 1 July in RELENG_6. http://www.freebsd.org/cgi/cvsweb.cgi/src/usr.sbin/cron/cron/do_command.c _______________________________________________ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"
文章代碼(AID): #14lDBQ00 (FB_security)
文章代碼(AID): #14lDBQ00 (FB_security)