Vulnerabilities > Condor Project > Condor > 6.8.2

DATE CVE VULNERABILITY TITLE RISK
2009-12-23 CVE-2009-4133 Condor 6.5.4 through 7.2.4, 7.3.x, and 7.4.0, as used in MRG, Grid for MRG, and Grid Execute Node for MRG, allows remote authenticated users to queue jobs as an arbitrary user, and thereby gain privileges, by using a Condor command-line tool to modify an unspecified job attribute.
network
low complexity
condor-project redhat
6.5
2008-10-08 CVE-2008-3830 Permissions, Privileges, and Access Controls vulnerability in Condor Project Condor
Condor before 7.0.5 does not properly handle when the configuration specifies overlapping netmasks in allow or deny rules, which causes the rule to be ignored and allows attackers to bypass intended access restrictions.
local
low complexity
condor-project CWE-264
7.2
2008-10-08 CVE-2008-3829 Multiple Security vulnerability in Condor Prior to 7.0.5
Unspecified vulnerability in the condor_ schedd daemon in Condor before 7.0.5 allows attackers to cause a denial of service (crash) via unknown vectors.
network
low complexity
condor-project
5.0
2008-10-08 CVE-2008-3828 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Condor Project Condor
Stack-based buffer overflow in the condor_ schedd daemon in Condor before 7.0.5 allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors.
local
low complexity
condor-project CWE-119
4.6
2008-10-08 CVE-2008-3826 Permissions, Privileges, and Access Controls vulnerability in Condor Project Condor
Unspecified vulnerability in Condor before 7.0.5 allows attackers to execute jobs as other users via unknown vectors.
local
low complexity
condor-project CWE-264
4.6