CVE-2006-2607 Affecting cron package, versions <3.0pl1-64


Severity

Recommended
medium

Based on Debian security rating.

Threat Intelligence

EPSS
0.09% (42nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN9-CRON-311950
  • published25 May 2006
  • disclosed25 May 2006

Introduced: 25 May 2006

CVE-2006-2607  (opens in a new tab)

How to fix?

Upgrade Debian:9 cron to version 3.0pl1-64 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream cron package and not the cron package as distributed by Debian. See How to fix? for Debian:9 relevant fixed versions and status.

do_command.c in Vixie cron (vixie-cron) 4.1 does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or resource limits, as originally demonstrated by a program that exceeds the process limits as defined in /etc/security/limits.conf.

CVSS Scores

version 3.1