发布时间 :2006-02-07 15:02:00
修订时间 :2017-07-19 21:29:53

[原文]convert-fcrontab in Fcron 2.9.5 and 3.0.0 allows remote attackers to create or overwrite arbitrary files via ".." sequences and a symlink attack on the temporary file that is used during conversion.

[CNNVD]Fcron Convert-FCronTab目录遍历漏洞(CNNVD-200602-078)

        Fcron 2.9.5和3.0.0中的convert-fcrontab存在目录遍历漏洞,远程攻击者可以借助".."序列以及对转换过程中使用的临时文件发起symlink攻击,来创建和覆盖任意文件。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  FULLDISC  20060202 Re: Fcrontab - memory corruption on heap.
(UNKNOWN)  BID  25693
(UNKNOWN)  TRUSTIX  2006-0006
(UNKNOWN)  VUPEN  ADV-2006-0435
(UNKNOWN)  XF  fcron-dotdot-directory-traversal(24504)

- 漏洞信息

Fcron Convert-FCronTab目录遍历漏洞
中危 访问验证错误
2006-02-07 00:00:00 2006-09-05 00:00:00
        Fcron 2.9.5和3.0.0中的convert-fcrontab存在目录遍历漏洞,远程攻击者可以借助".."序列以及对转换过程中使用的临时文件发起symlink攻击,来创建和覆盖任意文件。

- 公告与补丁


- 漏洞信息

Fcron convert-fcrontab Traversal Arbitrary File Manipulation
Input Manipulation

- 漏洞描述

Unknown or Incomplete

- 时间线

2006-02-02 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Fcron Convert-FCronTab Directory Traversal Vulnerability
Access Validation Error 25693
No Yes
2006-02-09 12:00:00 2008-03-13 03:01:00
Karol Wiesek discovered this issue.

- 受影响的程序版本

Trustix Secure Linux 3.0
Trustix Secure Linux 2.2
Trustix Operating System Enterprise Server 2.0
Fcron Fcron 3.0
Fcron Fcron 2.9.5

- 漏洞讨论

Fcron is prone to a directory-traversal vulnerability because it fails to adequately sanitize user-supplied data to 'convert-fcrontab'.

Attackers can exploit this issue via symbolic-link attacks to create or overwrite arbitrary files with superuser privileges.

Fcron 2.9.5 is vulnerable; other versions may also be affected.

- 漏洞利用

Currently we are not aware of any working exploits for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at:

- 解决方案

Updates have been released to address this issue. Please see the referenced advisories for more information.

- 相关参考