#VU7010 Privilege escalation in Cron - CVE-2017-9525

 

#VU7010 Privilege escalation in Cron - CVE-2017-9525

Published: June 12, 2017 / Updated: June 27, 2017


Vulnerability identifier: #VU7010
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2017-9525
CWE-ID: CWE-264
Exploitation vector: Local access
Exploit availability: No public exploit available
Vulnerable software:
Cron
Software vendor:
Ken Thompson

Description

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The weakness exists in Cron due to a flaw in the postinst maintainer script. A local attacker with crontab group privileges can conduct a symlink attack, bypass crontab privilege separation controls and gain root privileges on the target system.

Successful exploitation of the vulnerability results in privilege escalation.

Remediation

Cybersecurity Help is currently unaware of any official patch addressing the vulnerability.


External links