Condor before 7.0.5 does not properly handle when the configuration specifies overlapping netmasks in allow or deny rules, which causes the rule to be ignored and allows attackers to bypass intended access restrictions.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#SECTION00931000000000000000 | vendor advisory |
http://www.securitytracker.com/id?1021002 | vdb entry |
http://www.redhat.com/support/errata/RHSA-2008-0924.html | vendor advisory |
http://secunia.com/advisories/32232 | third party advisory |
http://secunia.com/advisories/32189 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/31621 | vdb entry |
https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00264.html | vendor advisory |
http://secunia.com/advisories/32193 | third party advisory |
http://www.redhat.com/support/errata/RHSA-2008-0911.html | vendor advisory |
http://www.vupen.com/english/advisories/2008/2760 | vdb entry |