Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2006-2607

Опубликовано: 25 мая 2006
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 7.2

Описание

do_command.c in Vixie cron (vixie-cron) 4.1 does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or resource limits, as originally demonstrated by a program that exceeds the process limits as defined in /etc/security/limits.conf.

РелизСтатусПримечание
dapper

released

3.0pl1-92ubuntu1.1
devel

released

3.0pl1-106ubuntu1
edgy

ignored

end of life, was needed
feisty

ignored

end of life, was needed
gutsy

ignored

end of life, was needed
hardy

released

3.0pl1-100ubuntu2.1
intrepid

released

3.0pl1-104+ubuntu5.1
jaunty

released

3.0pl1-105ubuntu1.1
upstream

released

3.0pl1-106

Показывать по

EPSS

Процентиль: 13%
0.00044
Низкий

7.2 High

CVSS2

Связанные уязвимости

redhat
больше 19 лет назад

do_command.c in Vixie cron (vixie-cron) 4.1 does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or resource limits, as originally demonstrated by a program that exceeds the process limits as defined in /etc/security/limits.conf.

nvd
больше 19 лет назад

do_command.c in Vixie cron (vixie-cron) 4.1 does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or resource limits, as originally demonstrated by a program that exceeds the process limits as defined in /etc/security/limits.conf.

debian
больше 19 лет назад

do_command.c in Vixie cron (vixie-cron) 4.1 does not check the return ...

github
больше 3 лет назад

do_command.c in Vixie cron (vixie-cron) 4.1 does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or resource limits, as originally demonstrated by a program that exceeds the process limits as defined in /etc/security/limits.conf.

fstec
около 19 лет назад

Уязвимость операционной системы Gentoo Linux, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 13%
0.00044
Низкий

7.2 High

CVSS2