5 results (0.006 seconds)

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

18 Apr 2007 — Vixie Cron before 4.1-r10 on Gentoo Linux is installed with insecure permissions, which allows local users to cause a denial of service (cron failure) by creating hard links, which results in a failed st_nlink check in database.c. Vixie Cron anterior a 4.1-r10 en Gentoo Linux es instalado con permisos inseguros, lo cual permite a usuarios locales provocar una denegación de servicio (fallo de cron) creando enlaces duros (hard links), lo cual resulta en el fallo de la comprobación st_nlink en database.c. • http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

25 May 2006 — do_command.c in Vixie cron (vixie-cron) 4.1 does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or resource limits, as originally demonstrated by a program that exceeds the process limits as defined in /etc/security/limits.conf. • http://bugs.gentoo.org/show_bug.cgi?id=134194 •

CVSS: 5.5EPSS: 0%CPEs: 4EXPL: 1

10 Apr 2005 — crontab in Vixie cron 4.1, when running with the -e option, allows local users to read the cron files of other users by changing the file being edited to a symlink. NOTE: there is insufficient information to know whether this is a duplicate of CVE-2001-0235. • ftp://patches.sgi.com/support/free/security/advisories/20060401-01-U •

CVSS: 7.8EPSS: 0%CPEs: 11EXPL: 0

25 Aug 1999 — Buffer overflow in Vixie cron allows local users to gain root access via a long MAILTO environment variable in a crontab file. • http://www.securityfocus.com/bid/611 •

CVSS: 7.2EPSS: 0%CPEs: 11EXPL: 1

25 Aug 1999 — Vixie Cron on Linux systems allows local users to set parameters of sendmail commands via the MAILTO environmental variable. • https://www.exploit-db.com/exploits/19474 •