#VU63055 Unchecked Return Value in cron (Debian package) - CVE-2019-9704
Published: May 11, 2022
Vulnerability identifier: #VU63055
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2019-9704
CWE-ID: CWE-252
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vulnerable software:
cron (Debian package)
cron (Debian package)
Software vendor:
Debian
Debian
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to the calloc return value is not checked. A local user can create a large crontab file and crash the daemon.
Remediation
Install updates from vendor's website.
External links
- https://salsa.debian.org/debian/cron/commit/f2525567
- http://www.securityfocus.com/bid/107373
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6DU7HAUAQR4E4AEBPYLUV6FZ4PHKH6A2/
- https://lists.debian.org/debian-lts-announce/2019/03/msg00025.html
- https://lists.debian.org/debian-lts-announce/2021/10/msg00029.html