Page 3 of 17 results (0.007 seconds)

CVSS: 5.2EPSS: 0%CPEs: 22EXPL: 0

Multiple format string vulnerabilities in Condor 7.2.0 through 7.6.4, and possibly certain 7.7.x versions, as used in Red Hat MRG Grid and possibly other products, allow local users to cause a denial of service (condor_schedd daemon and failure to launch jobs) and possibly execute arbitrary code via format string specifiers in (1) the reason for a hold for a job that uses an XML user log, (2) the filename of a file to be transferred, and possibly other unspecified vectors. Múltiples vulnerabilidades de cadena de formato en Condor 7.2.0 hasta 7.6.4 y posiblemente ciertas versiones 7.7.x, como las utilizadas en Red Hat MRG Grid y posiblemente otros productos, permiten a usuarios locales causar una denegación de servicio (demonio condor_schedd y fallo en el lanzamiento de trabajos) y posiblemente ejecutar código arbitrario a través de una cadena de especificadores de formato en (1) la razón de un retraso en un trabajo que utiliza un registro de usuario XML, (2) el nombre de un archivo pendiente de transferir y posiblemente otros vectores no especificados. • http://research.cs.wisc.edu/htcondor/security/vulnerabilities/CONDOR-2012-0001.html http://rhn.redhat.com/errata/RHSA-2012-0099.html http://rhn.redhat.com/errata/RHSA-2012-0100.html https://bugzilla.redhat.com/show_bug.cgi?id=759548 https://htcondor-git.cs.wisc.edu/?p=condor.git%3Ba=commitdiff%3Bh=5e5571d1a431eb3c61977b6dd6ec90186ef79867 https://htcondor-wiki.cs.wisc.edu/index.cgi/chngview?cn=28264 https://htcondor-wiki.cs.wisc.edu/index.cgi/chngview?cn=28429 https://htcondor-wiki.cs.w • CWE-134: Use of Externally-Controlled Format String •

CVSS: 6.5EPSS: 0%CPEs: 33EXPL: 0

Condor 6.5.4 through 7.2.4, 7.3.x, and 7.4.0, as used in MRG, Grid for MRG, and Grid Execute Node for MRG, allows remote authenticated users to queue jobs as an arbitrary user, and thereby gain privileges, by using a Condor command-line tool to modify an unspecified job attribute. Condor v6.5.4 hasta v7.2.4, v7.3.x, y v7.4.0, como el usado en MRG, Grid para MRG, y Grid Execute Node para MRG, permite a usuarios autenticados remotamente encolar tareas como un usuario de su elección, y de ese modo obtener privilegios, usando una herramienta de línea de commandos Condor para modificar un atributo de tarea no especificado. • http://condor-wiki.cs.wisc.edu/index.cgi/tktview?tn=1018 http://secunia.com/advisories/37766 http://secunia.com/advisories/37803 http://securitytracker.com/id?1023378 http://www.cs.wisc.edu/condor/manual/v7.4/8_3Stable_Release.html#SECTION00931000000000000000 http://www.cs.wisc.edu/condor/security/vulnerabilities/CONDOR-2009-0001.html http://www.redhat.com/support/errata/RHSA-2009-1688.html http://www.redhat.com/support/errata/RHSA-2009-1689.html http://www.securityfocus.com/bid& •

CVSS: 5.0EPSS: 1%CPEs: 15EXPL: 0

Unspecified vulnerability in the condor_ schedd daemon in Condor before 7.0.5 allows attackers to cause a denial of service (crash) via unknown vectors. Vulnerabilidad no especificada en el demonio (daemon) condor_ schedd de Condor anterior a v7.0.5, permite a los atacantes provocar una denegación de servicio (caída) a través de vectores desconocidos. • http://secunia.com/advisories/32189 http://secunia.com/advisories/32193 http://secunia.com/advisories/32232 http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#SECTION00931000000000000000 http://www.redhat.com/support/errata/RHSA-2008-0911.html http://www.redhat.com/support/errata/RHSA-2008-0924.html http://www.securityfocus.com/bid/31621 http://www.securitytracker.com/id?1021002 http://www.vupen.com/english/advisories/2008/2760 https://www.redhat.com/archives/f •

CVSS: 4.6EPSS: 0%CPEs: 15EXPL: 0

Unspecified vulnerability in Condor before 7.0.5 allows attackers to execute jobs as other users via unknown vectors. Vulnerabilidad no especificada en Condor anterior a v7.0.5, permite a los atacantes ejecutar trabajos como si fueran otros usuarios, a través de vectores desconocidos. • http://secunia.com/advisories/32189 http://secunia.com/advisories/32193 http://secunia.com/advisories/32232 http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#SECTION00931000000000000000 http://www.redhat.com/support/errata/RHSA-2008-0911.html http://www.redhat.com/support/errata/RHSA-2008-0924.html http://www.securityfocus.com/bid/31621 http://www.securitytracker.com/id?1021002 http://www.vupen.com/english/advisories/2008/2760 https://www.redhat.com/archives/f • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.2EPSS: 0%CPEs: 15EXPL: 0

Condor before 7.0.5 does not properly handle when the configuration specifies overlapping netmasks in allow or deny rules, which causes the rule to be ignored and allows attackers to bypass intended access restrictions. Condor anterior a v7.0.5 no maneja adecuadamente cuando la configuración especifica un solapamiento de máscaras de red en las reglas de "alow" (permitir) o "deny" (denegar); esto provoca que se ignore la regla y permite a los atacantes evitar las restricciones de acceso pretendidas. • http://secunia.com/advisories/32189 http://secunia.com/advisories/32193 http://secunia.com/advisories/32232 http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#SECTION00931000000000000000 http://www.redhat.com/support/errata/RHSA-2008-0911.html http://www.redhat.com/support/errata/RHSA-2008-0924.html http://www.securityfocus.com/bid/31621 http://www.securitytracker.com/id?1021002 http://www.vupen.com/english/advisories/2008/2760 https://www.redhat.com/archives/f • CWE-264: Permissions, Privileges, and Access Controls •