First published: Tue Oct 19 2021(Updated: )
FreeBSD's crontab calculates the MD5 sum of the previous and new cronjob to determine if any changes have been made before copying the new version in. In particular, it uses the MD5File() function, which takes a pathname as an argument, and is called with euid 0. A race condition in this process may lead to an arbitrary MD5 comparison regardless of the read permissions.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD FreeBSD |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1075 is a vulnerability in FreeBSD's crontab which allows for a race condition during cronjob changes.
CVE-2011-1075 has a severity rating of low.
FreeBSD's crontab uses the MD5 sum of the previous and new cronjob to determine if any changes have been made.
The vulnerable function in FreeBSD's crontab is the MD5File() function.
Yes, you can find references for CVE-2011-1075 at the following links: [link1](https://marc.info/?l=full-disclosure&m=129891323028897&w=2), [link2](https://www.openwall.com/lists/oss-security/2011/02/28/14), [link3](https://security.netapp.com/advisory/ntap-20211125-0004/).