#VU63053 Use-after-free in cron (Debian package) - CVE-2019-9706
Published: May 11, 2022
Vulnerability identifier: #VU63053
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2019-9706
CWE-ID: CWE-416
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vulnerable software:
cron (Debian package)
cron (Debian package)
Software vendor:
Debian
Debian
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a use-after-free error in force_rescan_user() function in Vixie Cron. A local user can write specially crafted data to the crontab file, trigger a use-after-free error and crash the daemon.
Remediation
Install updates from vendor's website.
External links
- https://salsa.debian.org/debian/cron/commit/40791b93
- https://packages.qa.debian.org/c/cron/news/20190311T170403Z.html
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=809167
- https://lists.debian.org/debian-lts-announce/2019/03/msg00025.html
- https://lists.debian.org/debian-lts-announce/2021/10/msg00029.html