Lucene search

K
nessusThis script is Copyright (C) 2006-2021 Tenable Network Security, Inc.SUSE_SA_2006_027.NASL
HistoryJun 01, 2006 - 12:00 a.m.

SUSE-SA:2006:027: cron

2006-06-0100:00:00
This script is Copyright (C) 2006-2021 Tenable Network Security, Inc.
www.tenable.com
7

The remote host is missing the patch for the advisory SUSE-SA:2006:027 (cron).

Vixie Cron is the default CRON daemon in all SUSE Linux based distributions.

The code in do_command.c in Vixie cron does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or resource limits.

This problem is known to affect only distributions with Linux 2.6 kernels, but the package was updated for all distributions for completeness.

This problem is tracked by the Mitre CVE ID CVE-2006-2607.

#%NASL_MIN_LEVEL 70300

#
# (C) Tenable Network Security, Inc.
#
# This plugin text was extracted from SuSE Security Advisory SUSE-SA:2006:027
#


if ( ! defined_func("bn_random") ) exit(0);

include('deprecated_nasl_level.inc');
include('compat.inc');

if(description)
{
 script_id(21623);
 script_version("1.9");
 
 name["english"] = "SUSE-SA:2006:027: cron";
 
 script_name(english:name["english"]);
 
 script_set_attribute(attribute:"synopsis", value:
"The remote host is missing a vendor-supplied security patch" );
 script_set_attribute(attribute:"description", value:
"The remote host is missing the patch for the advisory SUSE-SA:2006:027 (cron).


Vixie Cron is the default CRON daemon in all SUSE Linux based
distributions.

The code in do_command.c in Vixie cron does not check the return code
of a setuid call, which might allow local users to gain root privileges
if setuid fails in cases such as PAM failures or resource limits.

This problem is known to affect only distributions with Linux 2.6
kernels, but the package was updated for all distributions for
completeness.

This problem is tracked by the Mitre CVE ID CVE-2006-2607." );
 script_set_attribute(attribute:"solution", value:
"http://www.suse.de/security/advisories/2006-05-32.html" );
 script_set_attribute(attribute:"risk_factor", value:"High" );



 script_set_attribute(attribute:"plugin_publication_date", value: "2006/06/01");
 script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/14");
 script_end_attributes();

 
 summary["english"] = "Check for the version of the cron package";
 script_summary(english:summary["english"]);
 
 script_category(ACT_GATHER_INFO);
 
 script_copyright(english:"This script is Copyright (C) 2006-2021 Tenable Network Security, Inc.");
 family["english"] = "SuSE Local Security Checks";
 script_family(english:family["english"]);
 
 script_dependencies("ssh_get_info.nasl");
 script_require_keys("Host/SuSE/rpm-list");
 exit(0);
}

include("rpm.inc");
if ( rpm_check( reference:"cron-4.1-26.2", release:"SUSE10.0") )
{
 security_hole(0);
 exit(0);
}
if ( rpm_check( reference:"cron-3.0.1-920.12", release:"SUSE9.1") )
{
 security_hole(0);
 exit(0);
}
if ( rpm_check( reference:"cron-4.1-14.2", release:"SUSE9.2") )
{
 security_hole(0);
 exit(0);
}
if ( rpm_check( reference:"cron-4.1-20.2", release:"SUSE9.3") )
{
 security_hole(0);
 exit(0);
}