Cron is a task scheduler for Unix systems. Crontab is prone to a buffer overflow in handling of command line parameters. An attacker may take advantage of this by executing crontab with a malicious argument. If successfully exploited, this vulnerability will surrender 'root' access to the remote attacker.
Cron is a task scheduler for Unix systems. Crontab is prone to a buffer overflow in handling of command line parameters. An attacker may take advantage of this by executing crontab with a malicious argument. If successfully exploited, this vulnerability will surrender 'root' access to the remote attacker.