In the cron package through 3.0pl1-128 on Debian, and through 3.0pl1-128ubuntu2 on Ubuntu, the postinst maintainer script allows for group-crontab-to-root privilege escalation via symlink attacks against unsafe usage of the chown and chmod programs.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Cron | Cron_project | * | 3.0pl1-128. (including) |
Cron | Ubuntu | artful | * |
Cron | Ubuntu | bionic | * |
Cron | Ubuntu | cosmic | * |
Cron | Ubuntu | disco | * |
Cron | Ubuntu | esm-infra-legacy/trusty | * |
Cron | Ubuntu | esm-infra/xenial | * |
Cron | Ubuntu | precise/esm | * |
Cron | Ubuntu | trusty | * |
Cron | Ubuntu | trusty/esm | * |
Cron | Ubuntu | upstream | * |
Cron | Ubuntu | vivid/stable-phone-overlay | * |
Cron | Ubuntu | vivid/ubuntu-core | * |
Cron | Ubuntu | xenial | * |
Cron | Ubuntu | yakkety | * |
Cron | Ubuntu | zesty | * |