From owner-freebsd-bugs Mon Dec 16 00:07:09 1996 Return-Path: Received: (from root@localhost) by freefall.freebsd.org (8.8.4/8.8.4) id AAA12214 for bugs-outgoing; Mon, 16 Dec 1996 00:07:09 -0800 (PST) Received: from xkis.kis.ru (root@xkis.kis.ru [194.87.66.200]) by freefall.freebsd.org (8.8.4/8.8.4) with ESMTP id AAA12194; Mon, 16 Dec 1996 00:06:59 -0800 (PST) Received: from localhost (dv@localhost) by xkis.kis.ru (8.8.3/8.8.3) with SMTP id LAA12081; Mon, 16 Dec 1996 11:05:20 +0300 (MSK) Date: Mon, 16 Dec 1996 11:05:19 +0300 (MSK) From: Dmitry Valdov To: freebsd-bugs@freebsd.org, freebsd-security@freebsd.org Subject: crontab security hole Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-bugs@freebsd.org X-Loop: FreeBSD.org Precedence: bulk Hello! Are there any fixes for crontab? I've exploit which allow any user to become root using crontab security hole. Dmitry.