Vulnerability Name:

CVE-2012-3491 (CCN-78741)

Assigned:2012-09-19
Published:2012-09-19
Updated:2012-10-03
Summary:src/condor_schedd.V6/schedd.cpp in Condor 7.6.x before 7.6.10 and 7.8.x before 7.8.4 does not properly check the permissions of jobs, which allows remote authenticated users to remove arbitrary idle jobs via unspecified vectors.
CVSS v3 Severity:3.5 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): Required
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:4.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P)
3.0 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
4.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:P/A:N)
3.0 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:P/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-264
Vulnerability Consequences:Bypass Security
References:Source: CONFIRM
Type: Exploit
http://condor-git.cs.wisc.edu/?p=condor.git;a=commitdiff;h=1fff5d40

Source: MITRE
Type: CNA
CVE-2012-3491

Source: CONFIRM
Type: UNKNOWN
http://research.cs.wisc.edu/condor/manual/v7.6/8_3Stable_Release.html

Source: CCN
Type: Condor Web Site
9.3 Stable Release Series 7.8

Source: CONFIRM
Type: UNKNOWN
http://research.cs.wisc.edu/condor/manual/v7.8/9_3Stable_Release.html

Source: CCN
Type: RHSA-2012-1278
Moderate: Red Hat Enterprise MRG Grid 2.2 security update

Source: REDHAT
Type: Vendor Advisory
RHSA-2012:1278

Source: CCN
Type: RHSA-2012-1281
Moderate: Red Hat Enterprise MRG Grid 2.2 security update

Source: REDHAT
Type: Vendor Advisory
RHSA-2012:1281

Source: CCN
Type: SA50666
Condor Multiple Vulnerabilities

Source: SECUNIA
Type: Vendor Advisory
50666

Source: MLIST
Type: UNKNOWN
[oss-security] 20120920 Notification of upstream Condor security fixes

Source: CCN
Type: BID-55618
Cumin Multiple Remote Vulnerabilities

Source: BID
Type: UNKNOWN
55632

Source: CCN
Type: BID-55632
Condor Multiple Security Bypass Vulnerabilities

Source: CCN
Type: Red Hat Bugzilla Bug 848214
CVE-2012-3491 condor: local users can abort any idle jobs

Source: MISC
Type: UNKNOWN
https://bugzilla.redhat.com/show_bug.cgi?id=848214

Source: XF
Type: UNKNOWN
condor-write-sec-bypass(78741)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:condor_project:condor:7.6.0:*:*:*:*:*:*:*
  • OR cpe:/a:condor_project:condor:7.6.1:*:*:*:*:*:*:*
  • OR cpe:/a:condor_project:condor:7.6.2:*:*:*:*:*:*:*
  • OR cpe:/a:condor_project:condor:7.6.3:*:*:*:*:*:*:*
  • OR cpe:/a:condor_project:condor:7.6.4:*:*:*:*:*:*:*
  • OR cpe:/a:condor_project:condor:7.6.5:*:*:*:*:*:*:*
  • OR cpe:/a:condor_project:condor:7.6.6:*:*:*:*:*:*:*
  • OR cpe:/a:condor_project:condor:7.6.7:*:*:*:*:*:*:*
  • OR cpe:/a:condor_project:condor:7.6.8:*:*:*:*:*:*:*
  • OR cpe:/a:condor_project:condor:7.6.9:*:*:*:*:*:*:*
  • OR cpe:/a:condor_project:condor:7.8.0:*:*:*:*:*:*:*
  • OR cpe:/a:condor_project:condor:7.8.1:*:*:*:*:*:*:*
  • OR cpe:/a:condor_project:condor:7.8.2:*:*:*:*:*:*:*
  • OR cpe:/a:condor_project:condor:7.8.3:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:condor_project:condor:7.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:condor_project:condor:7.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:condor_project:condor:7.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:condor_project:condor:7.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:condor_project:condor:7.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:condor_project:condor:7.4.1:*:*:*:*:*:*:*
  • AND
  • cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_mrg:2.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    condor_project condor 7.6.0
    condor_project condor 7.6.1
    condor_project condor 7.6.2
    condor_project condor 7.6.3
    condor_project condor 7.6.4
    condor_project condor 7.6.5
    condor_project condor 7.6.6
    condor_project condor 7.6.7
    condor_project condor 7.6.8
    condor_project condor 7.6.9
    condor_project condor 7.8.0
    condor_project condor 7.8.1
    condor_project condor 7.8.2
    condor_project condor 7.8.3
    condor_project condor 7.0.0
    condor_project condor 7.0.1
    condor_project condor 7.0.2
    condor_project condor 7.0.3
    condor_project condor 7.0.4
    condor_project condor 7.4.1
    redhat enterprise linux 5
    redhat enterprise linux 6
    redhat enterprise mrg 2.0