Note: This is an archival copy of Security Sun Alert 237864 as previously published on http://sunsolve.sun.com.|
Latest version of this security advisory is available from http://support.oracle.com as Sun Alert 1019260.1.
Solaris 8 Operating System
Solaris 9 Operating System
Solaris 10 Operating System
Date of Resolved Release
A Security Vulnerability in the Solaris crontab(1) utility may allow execution of Arbitrary Code
A race condition security vulnerability in the Solaris crontab(1) utility may allow a local unprivileged user to inject arbitrary cron(1M) jobs into another local user's crontab file, leading to execution of arbitrary code with the privileges of that user. This condition may also be exploited to inject arbitrary entries into the root user's crontab file under certain circumstances, thereby allowing the local unprivileged user to execute arbitrary code with the privileges of the root user.
Sun acknowledges with thanks, Charles Morris of Old Dominion University for discovering and reporting this issue.
2. Contributing Factors
This issue can occur in the following releases:
OpenSolaris distributions may include additional bug fixes above and beyond the base build from which it was derived. The base build can be derived as follows:
$ uname -a
There are no predictable symptoms that would indicate the described issue has been exploited to execute arbitrary code.
There is no workaround for this issue. Please see the Resolution section below.
Copyright 2000-2008 Sun
Inc., 4150 Network Circle, Santa
Clara, CA 95054 U.S.A. All rights reserved.
07-Aug-2008: Updated Impact section for clarification
This solution has no attachment