7 results (0.011 seconds)

CVSS: 2.1EPSS: 10%CPEs: 2EXPL: 0

Vixie Cron before 4.1-r10 on Gentoo Linux is installed with insecure permissions, which allows local users to cause a denial of service (cron failure) by creating hard links, which results in a failed st_nlink check in database.c. Vixie Cron anterior a 4.1-r10 en Gentoo Linux es instalado con permisos inseguros, lo cual permite a usuarios locales provocar una denegación de servicio (fallo de cron) creando enlaces duros (hard links), lo cual resulta en el fallo de la comprobación st_nlink en database.c. • http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html http://rhn.redhat.com/errata/RHSA-2007-0345.html http://secunia.com/advisories/24905 http://secunia.com/advisories/24995 http://secunia.com/advisories/25321 http://secunia.com/advisories/25723 http://secunia.com/advisories/26909 http://secunia.com/advisories/27706 http://secunia.com/advisories/27886 http://security.gentoo.org/glsa/glsa-200704-11.xml http://support.avaya.com/elmodocs2/security/ASA- •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 2

Buffer overflow in Vixie cron 3.0.1-56 and earlier could allow a local attacker to gain additional privileges via a long username (> 20 characters). • http://archives.neohapsis.com/archives/bugtraq/2001-02/0197.html http://archives.neohapsis.com/archives/linux/immunix/2001-q1/0066.html http://www-1.ibm.com/support/search.wss?rs=0&q=IY17048&apar=only http://www-1.ibm.com/support/search.wss?rs=0&q=IY17261&apar=only http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-022.php3 http://www.osvdb.org/5583 http://www.redhat.com/support/errata/RHSA-2001-014.html https://exchange.xforce.ibmcloud.com/vulnerabilities/6 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 4

crontab in Vixie cron 3.0.1 and earlier does not properly drop privileges after the failed parsing of a modification operation, which could allow a local attacker to gain additional privileges when an editor is called to correct the error. • https://www.exploit-db.com/exploits/20822 https://www.exploit-db.com/exploits/20823 http://www.debian.org/security/2001/dsa-054 http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-050.php3 http://www.novell.com/linux/security/advisories/2001_017_cron_txt.html http://www.securityfocus.com/archive/1/183029 http://www.securityfocus.com/bid/2687 https://exchange.xforce.ibmcloud.com/vulnerabilities/6508 •

CVSS: 3.7EPSS: 0%CPEs: 1EXPL: 2

crontab by Paul Vixie uses predictable file names for a temporary file and does not properly ensure that the file is owned by the user executing the crontab -e command, which allows local users with write access to the crontab spool directory to execute arbitrary commands by creating world-writeable temporary files and modifying them while the victim is editing the file. • https://www.exploit-db.com/exploits/203 http://archives.neohapsis.com/archives/bugtraq/2000-11/0237.html http://www.securityfocus.com/bid/1960 https://exchange.xforce.ibmcloud.com/vulnerabilities/5543 •

CVSS: 7.2EPSS: 0%CPEs: 11EXPL: 0

Buffer overflow in Vixie cron allows local users to gain root access via a long MAILTO environment variable in a crontab file. • http://www.securityfocus.com/bid/611 http://www.securityfocus.com/bid/759 •