Condor before 7.8.2 allows remote attackers to bypass host-based authentication and execute actions such as ALLOW_ADMINISTRATOR or ALLOW_WRITE by connecting from a system with a spoofed reverse DNS hostname.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:40
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/84766 - | |
References | () http://research.cs.wisc.edu/condor/security/vulnerabilities/CONDOR-2012-0002.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2012-1168.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2012-1169.html - | |
References | () http://secunia.com/advisories/50246 - Vendor Advisory | |
References | () http://secunia.com/advisories/50294 - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/55032 - | |
References | () http://www.securitytracker.com/id?1027395 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/77748 - |
Information
Published : 2012-08-25 10:29
Updated : 2024-11-21 01:40
NVD link : CVE-2012-3416
Mitre link : CVE-2012-3416
CVE.ORG link : CVE-2012-3416
JSON object : View
Products Affected
condor_project
- condor
CWE
CWE-287
Improper Authentication