Filtered by vendor Condor Project
Subscribe
Total
17 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2012-3416 | 1 Condor Project | 1 Condor | 2023-02-12 | 10.0 HIGH | N/A |
Condor before 7.8.2 allows remote attackers to bypass host-based authentication and execute actions such as ALLOW_ADMINISTRATOR or ALLOW_WRITE by connecting from a system with a spoofed reverse DNS hostname. | |||||
CVE-2011-4930 | 3 Condor Project, Fedoraproject, Redhat | 3 Condor, Fedora, Enterprise Mrg | 2023-02-12 | 4.4 MEDIUM | N/A |
Multiple format string vulnerabilities in Condor 7.2.0 through 7.6.4, and possibly certain 7.7.x versions, as used in Red Hat MRG Grid and possibly other products, allow local users to cause a denial of service (condor_schedd daemon and failure to launch jobs) and possibly execute arbitrary code via format string specifiers in (1) the reason for a hold for a job that uses an XML user log, (2) the filename of a file to be transferred, and possibly other unspecified vectors. | |||||
CVE-2012-4462 | 2 Condor Project, Redhat | 2 Condor, Enterprise Mrg | 2023-02-12 | 4.3 MEDIUM | N/A |
aviary/jobcontrol.py in Condor, as used in Red Hat Enterprise MRG 2.3, when removing a job, allows remote attackers to cause a denial of service (condor_schedd restart) via square brackets in the cproc option. | |||||
CVE-2009-5136 | 2 Condor Project, Redhat | 2 Condor, Enterprise Mrg | 2021-07-15 | 4.0 MEDIUM | N/A |
The policy definition evaluator in Condor before 7.4.2 does not properly handle attributes in a WANT_SUSPEND policy that evaluate to an UNDEFINED state, which allows remote authenticated users to cause a denial of service (condor_startd exit) via a crafted job. | |||||
CVE-2013-4255 | 2 Condor Project, Redhat | 2 Condor, Enterprise Mrg | 2021-07-15 | 3.5 LOW | N/A |
The policy definition evaluator in Condor 7.5.4, 8.0.0, and earlier does not properly handle attributes in a (1) PREEMPT, (2) SUSPEND, (3) CONTINUE, (4) WANT_VACATE, or (5) KILL policy that evaluate to an Unconfigured, Undefined, or Error state, which allows remote authenticated users to cause a denial of service (condor_startd exit) via a crafted job. | |||||
CVE-2009-4133 | 2 Condor Project, Redhat | 2 Condor, Enterprise Mrg | 2021-07-15 | 6.5 MEDIUM | N/A |
Condor 6.5.4 through 7.2.4, 7.3.x, and 7.4.0, as used in MRG, Grid for MRG, and Grid Execute Node for MRG, allows remote authenticated users to queue jobs as an arbitrary user, and thereby gain privileges, by using a Condor command-line tool to modify an unspecified job attribute. | |||||
CVE-2012-5197 | 1 Condor Project | 1 Condor | 2017-08-28 | 10.0 HIGH | N/A |
Multiple unspecified vulnerabilities in Condor 7.6.x before 7.6.10 and 7.8.x before 7.8.4 have unknown impact and attack vectors related to "error checking of system calls." | |||||
CVE-2012-5196 | 1 Condor Project | 1 Condor | 2017-08-28 | 10.0 HIGH | N/A |
Multiple buffer overflows in Condor 7.6.x before 7.6.10 and 7.8.x before 7.8.4 have unknown impact and attack vectors. | |||||
CVE-2008-3424 | 1 Condor Project | 1 Condor | 2017-08-07 | 7.5 HIGH | N/A |
Condor before 7.0.4 does not properly handle wildcards in the ALLOW_WRITE, DENY_WRITE, HOSTALLOW_WRITE, or HOSTDENY_WRITE configuration variables in authorization policy lists, which might allow remote attackers to bypass intended access restrictions. | |||||
CVE-2012-5390 | 1 Condor Project | 1 Condor | 2014-06-09 | 10.0 HIGH | N/A |
The standard universe shadow (condor_shadow.std) component in Condor 7.7.3 through 7.7.6, 7.8.0 before 7.8.5, and 7.9.0 does no properly check privileges, which allows remote attackers to gain privileges via a crafted standard universe job. | |||||
CVE-2012-3492 | 1 Condor Project | 1 Condor | 2012-10-02 | 6.4 MEDIUM | N/A |
The filesystem authentication (condor_io/condor_auth_fs.cpp) in Condor 7.6.x before 7.6.10 and 7.8.x before 7.8.4 uses authentication directories even when they have weak permissions, which allows remote attackers to impersonate users by renaming a user's authentication directory. | |||||
CVE-2012-3491 | 1 Condor Project | 1 Condor | 2012-10-02 | 4.0 MEDIUM | N/A |
src/condor_schedd.V6/schedd.cpp in Condor 7.6.x before 7.6.10 and 7.8.x before 7.8.4 does not properly check the permissions of jobs, which allows remote authenticated users to remove arbitrary idle jobs via unspecified vectors. | |||||
CVE-2012-3493 | 1 Condor Project | 1 Condor | 2012-10-02 | 5.8 MEDIUM | N/A |
The command_give_request_ad function in condor_startd.V6/command.cpp Condor 7.6.x before 7.6.10 and 7.8.x before 7.8.4 allows remote attackers to obtain sensitive information, and possibly control or start arbitrary jobs, via a ClassAd request to the condor_startd port, which leaks the ClaimId. | |||||
CVE-2008-3826 | 1 Condor Project | 1 Condor | 2011-03-07 | 4.6 MEDIUM | N/A |
Unspecified vulnerability in Condor before 7.0.5 allows attackers to execute jobs as other users via unknown vectors. | |||||
CVE-2008-3830 | 1 Condor Project | 1 Condor | 2011-03-07 | 7.2 HIGH | N/A |
Condor before 7.0.5 does not properly handle when the configuration specifies overlapping netmasks in allow or deny rules, which causes the rule to be ignored and allows attackers to bypass intended access restrictions. | |||||
CVE-2008-3829 | 1 Condor Project | 1 Condor | 2011-03-07 | 5.0 MEDIUM | N/A |
Unspecified vulnerability in the condor_ schedd daemon in Condor before 7.0.5 allows attackers to cause a denial of service (crash) via unknown vectors. | |||||
CVE-2008-3828 | 1 Condor Project | 1 Condor | 2011-03-07 | 4.6 MEDIUM | N/A |
Stack-based buffer overflow in the condor_ schedd daemon in Condor before 7.0.5 allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors. |