__________________________________________________________

                       The U.S. Department of Energy
                   Computer Incident Advisory Capability
                           ___  __ __    _     ___
                          /       |     /_\   /
                          \___  __|__  /   \  \___
             __________________________________________________________

                             INFORMATION BULLETIN

                           vixie-cron Security Update
                               [RHSA-2006:0539-9]

July 13, 2006 23:00 GMT                                           Number Q-247
______________________________________________________________________________
PROBLEM:       A privilege escalation flaw was found in the way Vixie Cron 
               runs programs; vixie-cron does not properly verify an attempt 
               to set the current process user id succeeded. 
PLATFORM:      Red Hat Desktop (v. 4) 
               Red Hat Enterprise Linux AS (v. 4) 
               Red Hat Enterprise Linux ES (v. 4) 
               Red Hat Enterprise Linux WS (v. 4) 
DAMAGE:        It was possible for a malicious local users who exhausted 
               certain limits to execute arbitrary commands as root via cron. 
SOLUTION:      Apply current patches. 
______________________________________________________________________________
VULNERABILITY  The risk is MEDIUM. A local user can run commands as root. 
ASSESSMENT:                                                                   
______________________________________________________________________________
LINKS: 
 CIAC BULLETIN:      http://www.ciac.org/ciac/bulletins/q-247.shtml 
 ORIGINAL BULLETIN:  https://rhn.redhat.com/errata/RHSA-2006-0539.html 
 CVE:                http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2607 
______________________________________________________________________________
[***** Start RHSA-2006:0539-9 *****]

Important: vixie-cron security update
Advisory: 	RHSA-2006:0539-9
Type: 	Security Advisory
Issued on: 	2006-07-12
Last updated on: 	2006-07-12
Affected Products: 	Red Hat Desktop (v. 4)
Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux WS (v. 4)
CVEs (cve.mitre.org): 	CVE-2006-2607

Details

Updated vixie-cron packages that fix a privilege escalation issue are now
available.

This update has been rated as having important security impact by the Red Hat
Security Response Team.

The vixie-cron package contains the Vixie version of cron. Cron is a
standard UNIX daemon that runs specified programs at scheduled times.

A privilege escalation flaw was found in the way Vixie Cron runs programs;
vixie-cron does not properly verify an attempt to set the current process
user id succeeded. It was possible for a malicious local users who
exhausted certain limits to execute arbitrary commands as root via cron.
(CVE-2006-2607)

All users of vixie-cron should upgrade to these updated packages, which
contain a backported patch to correct this issue.

Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via Red Hat Network. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

Updated packages
Red Hat Desktop (v. 4)
SRPMS:
vixie-cron-4.1-44.EL4.src.rpm 	    84ffd65a8877af47400a731ecd1b9ee3
 
IA-32:
vixie-cron-4.1-44.EL4.i386.rpm 	    96f8e56c7683001feb3f3af160e5d3bc
 
x86_64:
vixie-cron-4.1-44.EL4.x86_64.rpm 	    3d045241d3453e8bc5a6bc260320fbc9
 
Red Hat Enterprise Linux AS (v. 4)
SRPMS:
vixie-cron-4.1-44.EL4.src.rpm 	    84ffd65a8877af47400a731ecd1b9ee3
 
IA-32:
vixie-cron-4.1-44.EL4.i386.rpm 	    96f8e56c7683001feb3f3af160e5d3bc
 
IA-64:
vixie-cron-4.1-44.EL4.ia64.rpm 	    a8d8d2c094a1d9aa1e8b565633f63491
 
PPC:
vixie-cron-4.1-44.EL4.ppc.rpm 	    abbfe3611ef001871714d508cb12ee78
 
s390:
vixie-cron-4.1-44.EL4.s390.rpm 	    13a5b37c0c9c360055a75c3b779603c9
 
s390x:
vixie-cron-4.1-44.EL4.s390x.rpm 	    869131c337de109964f8acb2e720ee33
 
x86_64:
vixie-cron-4.1-44.EL4.x86_64.rpm 	    3d045241d3453e8bc5a6bc260320fbc9
 
Red Hat Enterprise Linux ES (v. 4)
SRPMS:
vixie-cron-4.1-44.EL4.src.rpm 	    84ffd65a8877af47400a731ecd1b9ee3
 
IA-32:
vixie-cron-4.1-44.EL4.i386.rpm 	    96f8e56c7683001feb3f3af160e5d3bc
 
IA-64:
vixie-cron-4.1-44.EL4.ia64.rpm 	    a8d8d2c094a1d9aa1e8b565633f63491
 
x86_64:
vixie-cron-4.1-44.EL4.x86_64.rpm 	    3d045241d3453e8bc5a6bc260320fbc9
 
Red Hat Enterprise Linux WS (v. 4)
SRPMS:
vixie-cron-4.1-44.EL4.src.rpm 	    84ffd65a8877af47400a731ecd1b9ee3
 
IA-32:
vixie-cron-4.1-44.EL4.i386.rpm 	    96f8e56c7683001feb3f3af160e5d3bc
 
IA-64:
vixie-cron-4.1-44.EL4.ia64.rpm 	    a8d8d2c094a1d9aa1e8b565633f63491
 
x86_64:
vixie-cron-4.1-44.EL4.x86_64.rpm 	    3d045241d3453e8bc5a6bc260320fbc9
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

193146 - CVE-2006-2607 Jobs start from root when pam_limits enabled

References
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2607
http://www.redhat.com/security/updates/classification/#important 

[***** End RHSA-2006:0539-9 *****]
_______________________________________________________________________________

CIAC wishes to acknowledge the contributions of Red Hat for the 
information contained in this bulletin.
_______________________________________________________________________________


CIAC, the Computer Incident Advisory Capability, is the computer
security incident response team for the U.S. Department of Energy
(DOE) and the emergency backup response team for the National
Institutes of Health (NIH). CIAC is located at the Lawrence Livermore
National Laboratory in Livermore, California. CIAC is also a founding
member of FIRST, the Forum of Incident Response and Security Teams, a
global organization established to foster cooperation and coordination
among computer security teams worldwide.

CIAC services are available to DOE, DOE contractors, and the NIH. CIAC
can be contacted at:
    Voice:    +1 925-422-8193 (7x24)
    FAX:      +1 925-423-8002
    STU-III:  +1 925-423-2604
    E-mail:   ciac@ciac.org

Previous CIAC notices, anti-virus software, and other information are
available from the CIAC Computer Security Archive.

   World Wide Web:      http://www.ciac.org/
   Anonymous FTP:       ftp.ciac.org

PLEASE NOTE: Many users outside of the DOE, ESnet, and NIH computing
communities receive CIAC bulletins.  If you are not part of these
communities, please contact your agency's response team to report
incidents. Your agency's team will coordinate with CIAC. The Forum of
Incident Response and Security Teams (FIRST) is a world-wide
organization. A list of FIRST member organizations and their
constituencies can be obtained via WWW at http://www.first.org/.

This document was prepared as an account of work sponsored by an
agency of the United States Government. Neither the United States
Government nor the University of California nor any of their
employees, makes any warranty, express or implied, or assumes any
legal liability or responsibility for the accuracy, completeness, or
usefulness of any information, apparatus, product, or process
disclosed, or represents that its use would not infringe privately
owned rights. Reference herein to any specific commercial products,
process, or service by trade name, trademark, manufacturer, or
otherwise, does not necessarily constitute or imply its endorsement,
recommendation or favoring by the United States Government or the
University of California. The views and opinions of authors expressed
herein do not necessarily state or reflect those of the United States
Government or the University of California, and shall not be used for
advertising or product endorsement purposes.

LAST 10 CIAC BULLETINS ISSUED (Previous bulletins available from CIAC)

Q-237: iTunes 6.0.5
Q-238: Kernel Security Update
Q-239: ppp Programming Error
Q-240: Vulnerability in Server Service
Q-241: Vulnerability in Microsoft Internet Information Services using Active Server Pages
Q-242: Vulnerabilities in Microsoft Excel
Q-243: Vulnerabilities in Microsoft Office
Q-244: Vulnerabilities in Microsoft Office Filters
Q-245: Multiple Cisco Unified CallManager Vulnerabilities
Q-246: Cisco Router Web Setup Ships with Insecure Default IOS Configuration