Visit our newest sister site!
Hundreds of free aircraft flight manuals
Civilian • Historical • Military • Declassified • FREE!

TUCoPS :: Linux :: General :: ctab13.htm

Cron 3.0.pl1-63 exploit



    cron 3.0.pl1-63


    Matthew   Toseland   found   following.    This   appears   to  be
    debian-specific.   How to  exploit, other  than DoS  attacks/quota
    bypass?  What does /var/run/crond.reboot do?

    Matthew  have  discovered  a  problem  with  the cron 3.0pl1-63 in
    woody.  It does not close /var/run/crond.reboot when it forks  and
    setuids.  So   any  user   who  has   a  crontab   can  write   to
    /var/run/crond.reboot, which is created with permissions 0000  and
    user/group root/root.   This may  or may  not be  exploitable  for
    elevated  privelidge,  but  at  the  very  least  could be a quota
    violation or similar, leading to local DoS of the /var filesystem,
    hence disabling logging, mail, restarting of system daemons...  on
    most  systems.   Note  that  this   only  works  if  there  is   a
    /var/run/crond.reboot.  Sample code:

    #include <stdio.h>
    #include <unistd.h>
    void main()
       char* p = "hahahahahahahahahahahahahahahahahahahaha\n";
       int x = strlen(p);

    Compile and insert into your crontab.  DoS variant is obvious.


    BTW, is fixed now and appears to be debian-specific.

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2015 AOH