AOH :: HP Unsorted V :: B06-2468.HTM

Vixie-cron



rPSA-2006-0082-1 vixie-cron
rPSA-2006-0082-1 vixie-cron



rPath Security Advisory: 2006-0082-1
Published: 2006-05-25
Products: rPath Linux 1
Rating: Critical
Exposure Level Classification:
    Local Root Deterministic Privilege Escalation
Updated Versions:
vixie-cron=/conary.rpath.com@rpl:devel//1/4.1-5.2-1 

References:
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-xxxx-xxxx 
http://bugs.rpath.com/show_bug.cgi?id=1166 

Description:
    In previous versions of the vixie-cron package, when the
    /etc/security/limits.conf file has been set up with limits for
    any user, and that user has permission to use the cron facility,
    that user can use vixie-cron to run arbitrary programs as root by
    exceeding the limits set in /etc/security/limits.conf.
    
    By default, rPath Linux does not include any limits configured
    in the /etc/security/limits.conf file.  The /etc/security/limits.conf
    file is provided by the pam:data component, so to determine whether
    it has been changed in any way, run the command:
    
    # conary verify pam:data | grep /etc/security/limits.conf

The entire AOH site is optimized to look best in Firefox® 3 on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH
We do not send spam. If you have received spam bearing an artofhacking.com email address, please forward it with full headers to abuse@artofhacking.com.