First published: Wed Aug 25 1999(Updated: )
Buffer overflow in Vixie cron allows local users to gain root access via a long MAILTO environment variable in a crontab file.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
paul Vixie Vixie cron | =3.0_pl1 | |
SCO OpenLinux Server | =2.2 | |
Debian Debian Linux | =2.1 | |
Debian Debian Linux | =2.2 | |
Red Hat Linux | =4.0 | |
Red Hat Linux | =4.1 | |
Red Hat Linux | =4.2 | |
Red Hat Linux | =5.0 | |
Red Hat Linux | =5.1 | |
Red Hat Linux | =5.2 | |
Red Hat Linux | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-1999-0872 is considered a high severity vulnerability due to the potential for local users to gain root access.
To fix CVE-1999-0872, you should update Vixie cron to a version that addresses the buffer overflow issue.
CVE-1999-0872 affects local users on systems running vulnerable versions of Vixie cron, including specific releases of Debian, Red Hat, and SCO OpenLinux.
CVE-1999-0872 is a buffer overflow vulnerability that exploits the MAILTO environment variable in crontab files.
CVE-1999-0872 cannot be exploited remotely, as it requires local user access to the system to be effective.