Condor before 7.0.4 does not properly handle wildcards in the ALLOW_WRITE, DENY_WRITE, HOSTALLOW_WRITE, or HOSTDENY_WRITE configuration variables in authorization policy lists, which might allow remote attackers to bypass intended access restrictions.
The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.
Link | Tags |
---|---|
http://secunia.com/advisories/31423 | third party advisory broken link |
http://www.redhat.com/support/errata/RHSA-2008-0816.html | vendor advisory broken link |
http://secunia.com/advisories/31459 | third party advisory broken link |
https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00252.html | mailing list vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/44063 | vdb entry third party advisory |
http://www.securitytracker.com/id?1020646 | vdb entry third party advisory broken link |
http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#sec:New-7-0-4 | broken link |
http://www.securityfocus.com/bid/30440 | vdb entry third party advisory broken link |
http://secunia.com/advisories/31284 | broken link third party advisory vendor advisory |
http://www.redhat.com/support/errata/RHSA-2008-0814.html | vendor advisory broken link |