Summary
John Fitzpatrick from MWR Labs reported a stack-based buffer overflow vulnerability in torque, a PBS-derived batch processing queueing system.
An unauthenticated remote attacker could exploit this flaw to execute arbitrary code with root privileges.
Solution
For the oldstable distribution (squeeze), this problem has been fixed in version 2.4.8+dfsg-9squeeze4.
For the stable distribution (wheezy), this problem has been fixed in version 2.4.16+dfsg-1+deb7u3.
For the unstable distribution (sid), this problem has been fixed in version 2.4.16+dfsg-1.4.
We recommend that you upgrade your torque packages.
Insight
The TORQUE server dispatches jobs across physically separated machines. It may also be beneficial for single machines to organise the sequential execution of multiple jobs.
Affected
torque on Debian Linux
Detection
This check tests the installed software version using the apt package manager.
References
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2014-0749 -
CVSS Base Score: 10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities