[Home] [Credit Search] [Category Browser] [Staff Roll Call] | The LINUX.COM Article Archive |
Originally Published: Saturday, 28 August 1999 | Author: Quentin Cregan |
Published to: news_enhance_security/Security News | Page: 1/1 - [Printable] |
RHSA-1999:030-02 - RedHat Further Cron Update
Another problem has been located in Crontab. RedHat has released an update, which follows a week which included finding faults in other major applications, such as wu-ftpd.
|
Page 1 of 1 | |
---------------------------------------------------------------------
Red Hat, Inc. Security AdvisorySynopsis: Buffer overflow in cron daemon
Advisory ID: RHSA-1999:030-02Issue date: 1999-08-25Updated on: 1999-08-27
Keywords: vixie-cron crond MAILTOCross references:
---------------------------------------------------------------------
Revision History:
1999-08-27: Updated packages to fix problems on Red Hat Linux 4.2 and 5.2,
added credits, remove statement about 'no known exploits'1. Topic:
A buffer overflow exists in crond, the cron daemon. This
could allow local users to gain privilege.
2. Bug IDs fixed (http://developer.redhat.com/bugzilla/):4706
3. Relevant releases/architectures:
Red Hat Linux 4.2, 5.2, 6.0, all architectures4. Obsoleted by:5. Conflicts with:
6. RPMs required:Red Hat Linux 4.2:Intel:
rpm -Uvh ftp://ftp.redhat.com/redhat/updates/4.2/i386/vixie-cron-3.0.1-37.4.2.i386.rpm
Alpha:
rpm -Uvh ftp://ftp.redhat.com/redhat/updates/4.2/alpha/vixie-cron-3.0.1-37.4.2.alpha.rpm
Sparc:
rpm -Uvh ftp://ftp.redhat.com/redhat/updates/4.2/sparc/vixie-cron-3.0.1-37.4.2.sparc.rpm
Source packages:
rpm -Uvh ftp://ftp.redhat.com/redhat/updates/4.2/SRPMS/vixie-cron-3.0.1-37.4.2.src.rpm
Red Hat Linux 5.2:Intel:
rpm -Uvh ftp://ftp.redhat.com/redhat/updates/5.2/i386/vixie-cron-3.0.1-37.5.2.i386.rpm
Alpha:
rpm -Uvh ftp://ftp.redhat.com/redhat/updates/5.2/alpha/vixie-cron-3.0.1-37.5.2.alpha.rpm
Sparc:
rpm -Uvh ftp://ftp.redhat.com/redhat/updates/5.2/sparc/vixie-cron-3.0.1-37.5.2.sparc.rpm
Source packages:
rpm -Uvh ftp://ftp.redhat.com/redhat/updates/5.2/SRPMS/vixie-cron-3.0.1-37.5.2.src.rpm
Red Hat Linux 6.0:Intel:
rpm -Uvh ftp://ftp.redhat.com/redhat/updates/6.0/i386/vixie-cron-3.0.1-38.i386.rpm
Alpha:
rpm -Uvh ftp://ftp.redhat.com/redhat/updates/6.0/alpha/vixie-cron-3.0.1-38.alpha.rpm
Sparc:
rpm -Uvh ftp://ftp.redhat.com/redhat/updates/6.0/sparc/vixie-cron-3.0.1-38.sparc.rpm
Source packages:
rpm -Uvh ftp://ftp.redhat.com/redhat/updates/6.0/SRPMS/vixie-cron-3.0.1-38.src.rpm
7. Problem description:
By creating a crontab that runs with a specially formatted
'MAILTO' environment variable, it is possible for local users
to overflow a fixed-length buffer in the cron daemon's
cron_popen() function. Since the cron daemon runs as root,
it would be theoretcially possible for local users to use
this buffer overflow to gain root privilege.
Also, it was possible to use specially formatted 'MAILTO'
environment variables to send commands to sendmail.(1999-08-25)
The original pacakges released had the following problems:
- Some legitimate e-mail addresses in "MAILTO" could be rejected.
- The Red Hat Linux 4.2 and 5.2 packages shipped with logrotate
scripts that contained options not present in the logrotate
that shipped with those versions.
- The Red Hat Linux 4.2 (i386 and SPARC) packages did not correctly
reset the SIGCHLD handler, causing zombie processes to be created.
Users who experience these problems should upgrade to the newer
pacakges. There are no known security issues with the previouserrata packages.
Thanks go to Tymm Twillman, Martin Schulze, Pawel Veselov and others
for noting and providing some fixes for the vulnerabilities.8. Solution:
For each RPM for your particular architecture, run:rpm -Uvh
| |
Page 1 of 1 |