Privilege escalation in Cron - CVE-2017-9525

 

Privilege escalation in Cron - CVE-2017-9525

Published: June 12, 2017 / Updated: June 27, 2017


Vulnerability identifier: #VU7010
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2017-9525
CWE-ID: CWE-264
Exploitation vector: Local access
Exploit availability: No public exploit available
Vendor: Ken Thompson
Affected software:
Cron

Detailed vulnerability description

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The weakness exists in Cron due to a flaw in the postinst maintainer script. A local attacker with crontab group privileges can conduct a symlink attack, bypass crontab privilege separation controls and gain root privileges on the target system.

Successful exploitation of the vulnerability results in privilege escalation.

How to mitigate CVE-2017-9525

Cybersecurity Help is currently unaware of any official patch addressing the vulnerability.


Sources