Overview
- Description
- fcronsighup in Fcron 2.0.1, 2.9.4, and possibly earlier versions allows local users to bypass access restrictions and load an arbitrary configuration file by starting an suid process and pointing the fcronsighup configuration file to a /proc entry that is owned by root but modifiable by the user, such as /proc/self/cmdline or /proc/self/environ.
- Source
- cve@mitre.org
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.2
- Impact score
- 10
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:thibault_godouet:fcron:2.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2CC6BD83-D454-4FD8-904D-0A7C083F7AD5" }, { "criteria": "cpe:2.3:a:thibault_godouet:fcron:2.9.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2688EE86-C1A6-466B-B52E-11CFAE118335" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "647BA336-5538-4972-9271-383A0EC9378E" } ], "operator": "OR" } ] } ]