Rapid7 Vulnerability & Exploit Database

CESA-2006:0539: vixie-cron security update

Back to Search

CESA-2006:0539: vixie-cron security update

Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
05/25/2006
Created
07/25/2018
Added
03/12/2010
Modified
07/04/2017

Description

Updated vixie-cron packages that fix a privilege escalation issue are now available. This update has been rated as having important security impact by the CentOS Security Response Team.

The vixie-cron package contains the Vixie version of cron. Cron is a standard UNIX daemon that runs specified programs at scheduled times. A privilege escalation flaw was found in the way Vixie Cron runs programs; vixie-cron does not properly verify an attempt to set the current process user id succeeded. It was possible for a malicious local users who exhausted certain limits to execute arbitrary commands as root via cron. (CVE-2006-2607) All users of vixie-cron should upgrade to these updated packages, which contain a backported patch to correct this issue.

Solution(s)

  • centos-upgrade-vixie-cron

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;