Vulnerabilities > Condor Project
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2014-06-06 | CVE-2012-5390 | Permissions, Privileges, and Access Controls vulnerability in Condor Project Condor The standard universe shadow (condor_shadow.std) component in Condor 7.7.3 through 7.7.6, 7.8.0 before 7.8.5, and 7.9.0 does no properly check privileges, which allows remote attackers to gain privileges via a crafted standard universe job. | 10.0 |
2013-10-11 | CVE-2013-4255 | Improper Input Validation vulnerability in multiple products The policy definition evaluator in Condor 7.5.4, 8.0.0, and earlier does not properly handle attributes in a (1) PREEMPT, (2) SUSPEND, (3) CONTINUE, (4) WANT_VACATE, or (5) KILL policy that evaluate to an Unconfigured, Undefined, or Error state, which allows remote authenticated users to cause a denial of service (condor_startd exit) via a crafted job. | 3.5 |
2013-10-11 | CVE-2009-5136 | Improper Input Validation vulnerability in multiple products The policy definition evaluator in Condor before 7.4.2 does not properly handle attributes in a WANT_SUSPEND policy that evaluate to an UNDEFINED state, which allows remote authenticated users to cause a denial of service (condor_startd exit) via a crafted job. | 4.0 |
2012-09-28 | CVE-2012-5197 | Unspecified vulnerability in Condor Project Condor Multiple unspecified vulnerabilities in Condor 7.6.x before 7.6.10 and 7.8.x before 7.8.4 have unknown impact and attack vectors related to "error checking of system calls." | 10.0 |
2012-09-28 | CVE-2012-5196 | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Condor Project Condor Multiple buffer overflows in Condor 7.6.x before 7.6.10 and 7.8.x before 7.8.4 have unknown impact and attack vectors. | 10.0 |
2009-12-23 | CVE-2009-4133 | Condor 6.5.4 through 7.2.4, 7.3.x, and 7.4.0, as used in MRG, Grid for MRG, and Grid Execute Node for MRG, allows remote authenticated users to queue jobs as an arbitrary user, and thereby gain privileges, by using a Condor command-line tool to modify an unspecified job attribute. | 6.5 |
2008-10-08 | CVE-2008-3830 | Permissions, Privileges, and Access Controls vulnerability in Condor Project Condor Condor before 7.0.5 does not properly handle when the configuration specifies overlapping netmasks in allow or deny rules, which causes the rule to be ignored and allows attackers to bypass intended access restrictions. | 7.2 |
2008-10-08 | CVE-2008-3829 | Multiple Security vulnerability in Condor Prior to 7.0.5 Unspecified vulnerability in the condor_ schedd daemon in Condor before 7.0.5 allows attackers to cause a denial of service (crash) via unknown vectors. | 5.0 |
2008-10-08 | CVE-2008-3828 | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Condor Project Condor Stack-based buffer overflow in the condor_ schedd daemon in Condor before 7.0.5 allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors. | 4.6 |
2008-10-08 | CVE-2008-3826 | Permissions, Privileges, and Access Controls vulnerability in Condor Project Condor Unspecified vulnerability in Condor before 7.0.5 allows attackers to execute jobs as other users via unknown vectors. | 4.6 |