#VU7010 Privilege escalation in Cron - CVE-2017-9525
Published: June 12, 2017 / Updated: June 27, 2017
Vulnerability identifier: #VU7010
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2017-9525
CWE-ID: CWE-264
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vulnerable software:
Cron
Cron
Software vendor:
Ken Thompson
Ken Thompson
Description
The vulnerability allows a local attacker to gain elevated privileges on the target system.
The weakness exists in Cron due to a flaw in the postinst maintainer script. A local attacker with crontab group privileges can conduct a symlink attack, bypass crontab privilege separation controls and gain root privileges on the target system.
Successful exploitation of the vulnerability results in privilege escalation.
The weakness exists in Cron due to a flaw in the postinst maintainer script. A local attacker with crontab group privileges can conduct a symlink attack, bypass crontab privilege separation controls and gain root privileges on the target system.
Successful exploitation of the vulnerability results in privilege escalation.
Remediation
Cybersecurity Help is currently unaware of any official patch addressing the vulnerability.