// For flags

CVE-2016-10030

 

Severity Score

8.1
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The _prolog_error function in slurmd/req.c in Slurm before 15.08.13, 16.x before 16.05.7, and 17.x before 17.02.0-pre4 has a vulnerability in how the slurmd daemon informs users of a Prolog failure on a compute node. That vulnerability could allow a user to assume control of an arbitrary file on the system. Any exploitation of this is dependent on the user being able to cause or anticipate the failure (non-zero return code) of a Prolog script that their job would run on. This issue affects all Slurm versions from 0.6.0 (September 2005) to present. Workarounds to prevent exploitation of this are to either disable your Prolog script, or modify it such that it always returns 0 ("success") and adjust it to set the node as down using scontrol instead of relying on the slurmd to handle that automatically. If you do not have a Prolog set you are unaffected by this issue.

La función _prolog_error en slurmd/req.c en Slurm en versiones anteriores a 15.08.13, 16.x en versiones anteriores a 16.05.7 y 17.x en versiones anteriores a 17.02.0-pre4 tiene una vulnerabilidad en como el slurmd daemon informa a los usuarios de un fallo Prolog en un nodo de cálculo. Esta vulnerabilidad podría permitir a un usuario asumir el control de un archivo arbitrario en el sistema. Cualquier explotación de esto depende de que el usuario pueda provocar o anticipar el fallo (código de retorno distinto de cero) de una secuencia de comandos Prolog que ejecutaría su trabajo. Este problema afecta a todas las versiones de Slurm desde la 0.6.0 (septiembre de 2005) hasta el presente. Las soluciones para evitar la explotación de esto son para deshabilitar su secuencia de comandos Prolog, o modificarlo de tal manera que siempre devuelva 0 ("éxito") y ajustarlo para establecer el nodo como caído utilizando scontrol en lugar de confiar en slurmd para manejarlo automáticamente. Si no tiene un conjunto Prolog, no se verá afectado por este problema.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
High
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2016-12-22 CVE Reserved
  • 2017-01-05 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-08-06 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-284: Improper Access Control
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Schedmd
Search vendor "Schedmd"
Slurm
Search vendor "Schedmd" for product "Slurm"
<= 15.08.12
Search vendor "Schedmd" for product "Slurm" and version " <= 15.08.12"
-
Affected
Schedmd
Search vendor "Schedmd"
Slurm
Search vendor "Schedmd" for product "Slurm"
16.05.0
Search vendor "Schedmd" for product "Slurm" and version "16.05.0"
-
Affected
Schedmd
Search vendor "Schedmd"
Slurm
Search vendor "Schedmd" for product "Slurm"
16.05.0
Search vendor "Schedmd" for product "Slurm" and version "16.05.0"
pre1
Affected
Schedmd
Search vendor "Schedmd"
Slurm
Search vendor "Schedmd" for product "Slurm"
16.05.0
Search vendor "Schedmd" for product "Slurm" and version "16.05.0"
pre2
Affected
Schedmd
Search vendor "Schedmd"
Slurm
Search vendor "Schedmd" for product "Slurm"
16.05.0
Search vendor "Schedmd" for product "Slurm" and version "16.05.0"
rc1
Affected
Schedmd
Search vendor "Schedmd"
Slurm
Search vendor "Schedmd" for product "Slurm"
16.05.0
Search vendor "Schedmd" for product "Slurm" and version "16.05.0"
rc2
Affected
Schedmd
Search vendor "Schedmd"
Slurm
Search vendor "Schedmd" for product "Slurm"
16.05.1
Search vendor "Schedmd" for product "Slurm" and version "16.05.1"
-
Affected
Schedmd
Search vendor "Schedmd"
Slurm
Search vendor "Schedmd" for product "Slurm"
16.05.2
Search vendor "Schedmd" for product "Slurm" and version "16.05.2"
-
Affected
Schedmd
Search vendor "Schedmd"
Slurm
Search vendor "Schedmd" for product "Slurm"
16.05.3
Search vendor "Schedmd" for product "Slurm" and version "16.05.3"
-
Affected
Schedmd
Search vendor "Schedmd"
Slurm
Search vendor "Schedmd" for product "Slurm"
16.05.4
Search vendor "Schedmd" for product "Slurm" and version "16.05.4"
-
Affected
Schedmd
Search vendor "Schedmd"
Slurm
Search vendor "Schedmd" for product "Slurm"
16.05.5
Search vendor "Schedmd" for product "Slurm" and version "16.05.5"
-
Affected
Schedmd
Search vendor "Schedmd"
Slurm
Search vendor "Schedmd" for product "Slurm"
16.05.6
Search vendor "Schedmd" for product "Slurm" and version "16.05.6"
-
Affected
Schedmd
Search vendor "Schedmd"
Slurm
Search vendor "Schedmd" for product "Slurm"
17.02.0
Search vendor "Schedmd" for product "Slurm" and version "17.02.0"
pre1
Affected
Schedmd
Search vendor "Schedmd"
Slurm
Search vendor "Schedmd" for product "Slurm"
17.02.0
Search vendor "Schedmd" for product "Slurm" and version "17.02.0"
pre2
Affected
Schedmd
Search vendor "Schedmd"
Slurm
Search vendor "Schedmd" for product "Slurm"
17.02.0
Search vendor "Schedmd" for product "Slurm" and version "17.02.0"
pre3
Affected