SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Condor Vendors:   University of Wisconsin-Madison
Condor Authorization List Bug May Let Remote Users Bypass Access Controls
SecurityTracker Alert ID:  1020646
SecurityTracker URL:  http://securitytracker.com/id/1020646
CVE Reference:   CVE-2008-3424   (Links to External Site)
Date:  Aug 11 2008
Impact:   Host/resource access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 7.0.4
Description:   A vulnerability was reported in Condor. A remote user may be able to bypass access controls.

The software does not properly process wild card characters in authorization lists. If the system has a configuration variable that specifies the policy and contains the wild card asterisk character, a user may be able to access the system.

Affected variables include ALLOW_WRITE, DENY_WRITE, HOSTALLOW_WRITE, and HOSTDENY_WRITE.

Impact:   A remote user may be able to bypass access controls and access the target system.
Solution:   The vendor has issued a fixed version (7.0.4), available at:

http://www.cs.wisc.edu/condor/downloads-v2/download.pl

Vendor URL:  www.cs.wisc.edu/condor/ (Links to External Site)
Cause:   Access control error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Aug 11 2008 (Red Hat Issues Fix) Condor Authorization List Bug May Let Remote Users Bypass Access Controls
Red Hat has released a fix for Red Hat Enterprise MRG.
Aug 11 2008 (Red Hat Issues Fix) Condor Authorization List Bug May Let Remote Users Bypass Access Controls
Red Hat has released a fix for Red Hat Enterprise MRG on RHEL 4.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC