First published: Wed Nov 24 2004(Updated: )
fcronsighup in Fcron 2.0.1, 2.9.4, and possibly earlier versions allows local users to bypass access restrictions and load an arbitrary configuration file by starting an suid process and pointing the fcronsighup configuration file to a /proc entry that is owned by root but modifiable by the user, such as /proc/self/cmdline or /proc/self/environ.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FCron | =2.9.4 | |
FCron | =2.0.1 | |
Gentoo Linux |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-1031 is considered a critical vulnerability as it allows local users to bypass access restrictions.
To mitigate CVE-2004-1031, ensure that the affected versions of Fcron are upgraded to a secure version that addresses this vulnerability.
CVE-2004-1031 primarily affects Thibault Godouet's Fcron versions 2.0.1 and 2.9.4, as well as potentially earlier versions on Gentoo Linux.
Yes, CVE-2004-1031 can allow local users to gain unauthorized access to system configurations through the exploitation of the vulnerability.
While CVE-2004-1031 is a legacy vulnerability, systems running outdated versions of Fcron may still be at risk and should be updated accordingly.