In the cron package through 3.0pl1-128 on Debian, and through 3.0pl1-128ubuntu2 on Ubuntu, the postinst maintainer script allows for group-crontab-to-root privilege escalation via symlink attacks against unsafe usage of the chown and chmod programs.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Link | Tags |
---|---|
http://bugs.debian.org/864466 | issue tracking third party advisory vendor advisory |
http://www.openwall.com/lists/oss-security/2017/06/08/3 | third party advisory mailing list |
http://www.securitytracker.com/id/1038651 | vdb entry third party advisory |
https://lists.debian.org/debian-lts-announce/2019/03/msg00025.html | third party advisory mailing list |
https://lists.debian.org/debian-lts-announce/2021/10/msg00029.html | third party advisory mailing list |