{"id":"UBUNTU-CVE-2017-9525","details":"In the cron package through 3.0pl1-128 on Debian, and through 3.0pl1-128ubuntu2 on Ubuntu, the postinst maintainer script allows for group-crontab-to-root privilege escalation via symlink attacks against unsafe usage of the chown and chmod programs.","modified":"2026-01-30T01:41:28.502557Z","published":"2017-06-09T16:29:00Z","related":["USN-5259-1","USN-5259-2","USN-5259-3"],"upstream":["CVE-2017-9525"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-9525"},{"type":"REPORT","url":"http://www.openwall.com/lists/oss-security/2017/06/08/3"},{"type":"REPORT","url":"http://bugs.debian.org/864466"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5259-1"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5259-2"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5259-3"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2017-9525"}],"affected":[{"package":{"name":"cron","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/cron@3.0pl1-124ubuntu2?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["3.0pl1-124ubuntu2"],"ecosystem_specific":{"binaries":[{"binary_version":"3.0pl1-124ubuntu2","binary_name":"cron"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-9525.json"}},{"package":{"name":"cron","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/cron@3.0pl1-128ubuntu2+esm2?arch=source&distro=esm-infra/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.0pl1-128ubuntu2+esm2"}]}],"versions":["3.0pl1-127ubuntu1","3.0pl1-128ubuntu1","3.0pl1-128ubuntu2","3.0pl1-128ubuntu2+esm1"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro","binaries":[{"binary_version":"3.0pl1-128ubuntu2+esm2","binary_name":"cron"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-9525.json"}},{"package":{"name":"cron","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/cron@3.0pl1-128.1ubuntu1.2?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.0pl1-128.1ubuntu1.2"}]}],"versions":["3.0pl1-128ubuntu5","3.0pl1-128.1ubuntu1","3.0pl1-128.1ubuntu1.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"3.0pl1-128.1ubuntu1.2","binary_name":"cron"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-9525.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}]}