Description
In the cron package through 3.0pl1-128 on Debian, and through 3.0pl1-128ubuntu2 on Ubuntu, the postinst maintainer script allows for group-crontab-to-root privilege escalation via symlink attacks against unsafe usage of the chown and chmod programs.
Published: 2017-06-09
Score: 6.7 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-1723-1 cron security update
Debian DLA Debian DLA DLA-2801-1 cron security update
EUVD EUVD EUVD-2017-18456 In the cron package through 3.0pl1-128 on Debian, and through 3.0pl1-128ubuntu2 on Ubuntu, the postinst maintainer script allows for group-crontab-to-root privilege escalation via symlink attacks against unsafe usage of the chown and chmod programs.
Ubuntu USN Ubuntu USN USN-5259-1 Cron vulnerabilities
Ubuntu USN Ubuntu USN USN-5259-2 Cron vulnerabilities
Ubuntu USN Ubuntu USN USN-5259-3 Cron regression
History

No history.

Subscriptions

Canonical Ubuntu Linux
Cron Project Cron
Debian Debian Linux
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T17:11:01.621Z

Reserved: 2017-06-09T00:00:00.000Z

Link: CVE-2017-9525

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2017-06-09T16:29:02.110

Modified: 2026-05-13T00:24:29.033

Link: CVE-2017-9525

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses