Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA054] DSA-054-1 cron


Vulnerability Assessment Details

[DSA054] DSA-054-1 cron

Vulnerability Assessment Summary
DSA-054-1 cron

Detailed Explanation for this Vulnerability Assessment

A recent (fall 2000) security fix to cron introduced an error in giving
up rights before invoking the editor. This was discovered by Sebastian
Krahmer from SuSE. A malicious user could easily gain root access.

This has been fixed in version 3.0pl1-57.3 (or 3.0pl1-67 for unstable).
No exploits are known to exist, but we recommend that you upgrade your
cron packages immediately.



Solution : http://www.debian.org/security/2001/dsa-054
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is (C) 2005 Michel Arboi

Cables, Connectors

1976 Scelbi Intel 8080 Machine Language Routines Altair 8800 IMSAI Programming
$20.0
1976 Scelbi Intel 8080 Machine Language Routines Altair 8800 IMSAI Programming pictureStan Veit's Personal Computer History Altair 8800 IBM 5150 Apple 1 Scelbi SWTPC
$48.0
Stan Veit's Personal Computer History Altair 8800 IBM 5150 Apple 1 Scelbi SWTPC pictureStan Veit's Personal Computer History Altair 8800 IBM 5150 Apple 1 Scelbi SWTPC
$44.0
Stan Veit's Personal Computer History Altair 8800 IBM 5150 Apple 1 Scelbi SWTPC pictureAltair 8800 Steve Wozniak Mark-8 Whirlwind Core Memory Jack Kilby ENIAC Apple 1
$32.0
Altair 8800 Steve Wozniak Mark-8 Whirlwind Core Memory Jack Kilby ENIAC Apple 1 picture


Discussions

No Discussions have been posted on this vulnerability.