what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

debian.cron.txt

debian.cron.txt
Posted Nov 19, 2000
Site debian.org

Debian Security Advisory - The version of Vixie Cron shipped with Debian GNU/Linux 2.2 is vulnerable to a local attack, discovered by Michal Zalewski. Several problems, including insecure permissions on temporary files and race conditions in their deletion, allowed attacks from a denial of service (preventing the editing of crontabs) to an escalation of privilege (when another user edited their crontab). As a temporary fix, "chmod go-rx /var/spool/cron/crontabs" prevents the only available exploit; however, it does not address the problem - upgrade is needed.

tags | denial of service, local
systems | linux, debian
SHA-256 | 45066b5be833b8794dd17760df1ec1d6a414c23ede771168906f53a3c837a917

debian.cron.txt

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----

- ----------------------------------------------------------------------------
Debian Security Advisory security@debian.org
http://www.debian.org/security/ Daniel Jacobowitz
November 17, 2000
- ----------------------------------------------------------------------------

Package: cron
Vulnerability: local priviledge escalation
Debian-specific: no
Vulnerable: yes

The version of Vixie Cron shipped with Debian GNU/Linux 2.2 is vulnerable to
a local attack, discovered by Michal Zalewski. Several problems, including
insecure permissions on temporary files and race conditions in their
deletion, allowed attacks from a denial of service (preventing the editing
of crontabs) to an escalation of priviledge (when another user edited their
crontab).

As a temporary fix, "chmod go-rx /var/spool/cron/crontabs" prevents the only
available exploit; however, it does not address the problem. We recommend
upgrading to version 3.0pl1-57.1, for Debian 2.2, or 3.0pl1-61, for Debian
unstable.

Also, in the new cron packages, it is no longer possible to specify special
files (devices, named pipes, etc.) by name to crontab. Note that this is
not so much a security fix as a sanity check.

Debian GNU/Linux 2.1 alias slink
- --------------------------------

Slink is no longer being supported by the Debian Security Team. We highly
recommend an upgrade to the current stable release.

Debian GNU/Linux 2.2 (stable) alias potato
- ------------------------------------------

Fixes are currently available for the Alpha, ARM, Intel ia32, Motorola 680x0,
PowerPC and Sun SPARC architectures, and will be included in 2.2r2.

Source archives:
http://security.debian.org/dists/potato/updates/main/source/cron_3.0pl1-57.1.diff.gz
MD5 checksum: 4fac4be2841908090d1c877a65cf5ef9
http://security.debian.org/dists/potato/updates/main/source/cron_3.0pl1-57.1.dsc
MD5 checksum: caed3f1556203618544eec823347df30
http://security.debian.org/dists/potato/updates/main/source/cron_3.0pl1.orig.tar.gz
MD5 checksum: 4c64aece846f8483daf440f8e3dd210f

Alpha architecture:
http://security.debian.org/dists/potato/updates/main/binary-alpha/cron_3.0pl1-57.1_alpha.deb
MD5 checksum: 3b146f5227182343d3b20cf8fce8a86c

ARM architecture:
http://security.debian.org/dists/potato/updates/main/binary-arm/cron_3.0pl1-57.1_arm.deb
MD5 checksum: 559e80e83abf371a8d09759ee900daf5

Intel IA32 architecture:
http://security.debian.org/dists/potato/updates/main/binary-arm/cron_3.0pl1-57.1_i386.deb
MD5 checksum: 922bb72b07a05fb888771364697f52e1

Motorola 680x0 architecture:
http://security.debian.org/dists/potato/updates/main/binary-m68k/cron_3.0pl1-57.1_m68k.deb
MD5 checksum: 2e0d8152ec03a66bb88ba84215fe4de3

PowerPC architecture:
http://security.debian.org/dists/potato/updates/main/binary-powerpc/cron_3.0pl1-57.1_powerpc.deb
MD5 checksum: 16ad8c4a26436239e7a25260340be6d5

Sun Sparc architecture:
http://security.debian.org/dists/potato/updates/main/binary-sparc/cron_3.0pl1-57.1_sparc.deb
MD5 checksum: 2bd401a635eedc47e9f6dd1652f71e35

Debian GNU/Linux Unstable alias woody
- -------------------------------------

This version of Debian is not yet released.

Fixes will be made available for Alpha, ARM, Intel ia32, Motorola 680x0,
PowerPC, and SPARC in the Debian archive over the next several days.

- ----------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
Mailing list: debian-security-announce@lists.debian.org

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a
Charset: noconv

iQCVAwUBOhX30z5fjwqn/34JAQEBgAQAjE4b75YohlZB/bE7xvDtjZ5UchkpIUyC
T3CwbwduLDOylVW7lqQz4Qb/wX4+k02z2keFaVU/neWqqj58/imX6Io5L2klt4uw
+UmFpm5qKWqEg0A7dRVHEehjQzWa0DSo8gnwbBlpq6prJ+yKavkJ04v5J6/tcVtD
hgF+R1UAwdk=
=QTfW
-----END PGP SIGNATURE-----


--
To UNSUBSCRIBE, email to debian-security-announce-request@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org

Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    35 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close