Condor before 7.8.2 allows remote attackers to bypass host-based authentication and execute actions such as ALLOW_ADMINISTRATOR or ALLOW_WRITE by connecting from a system with a spoofed reverse DNS hostname.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/77748 | vdb entry |
http://rhn.redhat.com/errata/RHSA-2012-1168.html | vendor advisory |
http://www.securitytracker.com/id?1027395 | vdb entry |
http://osvdb.org/84766 | vdb entry |
http://secunia.com/advisories/50246 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/55032 | vdb entry |
http://secunia.com/advisories/50294 | third party advisory vendor advisory |
http://rhn.redhat.com/errata/RHSA-2012-1169.html | vendor advisory |
http://research.cs.wisc.edu/condor/security/vulnerabilities/CONDOR-2012-0002.html |