Описание
do_command.c in Vixie cron (vixie-cron) 4.1 does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or resource limits, as originally demonstrated by a program that exceeds the process limits as defined in /etc/security/limits.conf.
Релиз | Статус | Примечание |
---|---|---|
dapper | released | 3.0pl1-92ubuntu1.1 |
devel | released | 3.0pl1-106ubuntu1 |
edgy | ignored | end of life, was needed |
feisty | ignored | end of life, was needed |
gutsy | ignored | end of life, was needed |
hardy | released | 3.0pl1-100ubuntu2.1 |
intrepid | released | 3.0pl1-104+ubuntu5.1 |
jaunty | released | 3.0pl1-105ubuntu1.1 |
upstream | released | 3.0pl1-106 |
Показывать по
EPSS
7.2 High
CVSS2
Связанные уязвимости
do_command.c in Vixie cron (vixie-cron) 4.1 does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or resource limits, as originally demonstrated by a program that exceeds the process limits as defined in /etc/security/limits.conf.
do_command.c in Vixie cron (vixie-cron) 4.1 does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or resource limits, as originally demonstrated by a program that exceeds the process limits as defined in /etc/security/limits.conf.
do_command.c in Vixie cron (vixie-cron) 4.1 does not check the return ...
do_command.c in Vixie cron (vixie-cron) 4.1 does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or resource limits, as originally demonstrated by a program that exceeds the process limits as defined in /etc/security/limits.conf.
Уязвимость операционной системы Gentoo Linux, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
EPSS
7.2 High
CVSS2