Summary
Florian Weimer, of Red Hat Product
Security, discovered an issue in condor, a distributed workload management system.
Upon job completion, it can optionally notify a user by sending an email the mailx
invocation used in that process allowed for any authenticated user able to submit jobs, to execute arbitrary code with the privileges of the condor user.
Solution
For the stable distribution (wheezy),
this problem has been fixed in version 7.8.2~dfsg.1-1+deb7u3.
For the upcoming stable distribution (jessie) and unstable distribution (sid), this problem has been fixed in version 8.2.3~dfsg.1-6.
We recommend that you upgrade your condor packages.
Insight
Like other full-featured batch systems,
Condor provides a job queueing 0mechanism, scheduling policy, priority scheme, resource monitoring, and resource management. Users submit their serial or parallel jobs to Condor
Condor places them into a queue. It chooses when and where to run the jobs based upon a policy, carefully monitors their progress, and ultimately informs the user upon completion.
Affected
condor on Debian Linux
Detection
This check tests the installed software
version using the apt package manager.
References
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2014-8126 -
CVSS Base Score: 10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities