Summary
The remote host is missing an update to cron
announced via advisory USN-778-1.
Solution
The problem can be corrected by upgrading your system to the following package versions:
Ubuntu 6.06 LTS:
cron 3.0pl1-92ubuntu1.1
Ubuntu 8.04 LTS:
cron 3.0pl1-100ubuntu2.1
Ubuntu 8.10:
cron 3.0pl1-104+ubuntu5.1
Ubuntu 9.04:
cron 3.0pl1-105ubuntu1.1
In general, a standard system upgrade is sufficient to effect the necessary changes.
https://secure1.securityspace.com/smysecure/catid.html?in=USN-778-1
Insight
It was discovered that cron did not properly check the return code of the setgid() and initgroups() system calls. A local attacker could use this to escalate group privileges. Please note that cron versions 3.0pl1-64 and later were already patched to address the more serious setuid() check referred to by CVE-2006-2607.
Severity
Classification
-
CVE CVE-2006-2607 -
CVSS Base Score: 7.2
AV:L/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities