Filtered by vendor Wisc
Subscribe
Total
11 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-26110 | 2 Debian, Wisc | 2 Debian Linux, Htcondor | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
An issue was discovered in HTCondor 8.8.x before 8.8.16, 9.0.x before 9.0.10, and 9.1.x before 9.6.0. When a user authenticates to an HTCondor daemon via the CLAIMTOBE method, the user can then impersonate any entity when issuing additional commands to that daemon. | |||||
CVE-2021-45104 | 1 Wisc | 1 Htcondor | 2024-11-21 | 5.8 MEDIUM | 7.4 HIGH |
An issue was discovered in HTCondor 9.0.x before 9.0.10 and 9.1.x before 9.5.1. An attacker who can capture HTCondor network data can interfere with users' jobs and data. | |||||
CVE-2021-45103 | 1 Wisc | 1 Htcondor | 2024-11-21 | 5.5 MEDIUM | 8.1 HIGH |
An issue was discovered in HTCondor 9.0.x before 9.0.10 and 9.1.x before 9.5.1. An attacker can access files stored in S3 cloud storage that a user has asked HTCondor to transfer. | |||||
CVE-2021-45102 | 1 Wisc | 1 Htcondor | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
An issue was discovered in HTCondor 9.0.x before 9.0.4 and 9.1.x before 9.1.2. When authenticating to an HTCondor daemon using a SciToken, a user may be granted authorizations beyond what the token should allow. | |||||
CVE-2021-45101 | 1 Wisc | 1 Htcondor | 2024-11-21 | 5.5 MEDIUM | 8.1 HIGH |
An issue was discovered in HTCondor before 8.8.15, 9.0.x before 9.0.4, and 9.1.x before 9.1.2. Using standard command-line tools, a user with only READ access to an HTCondor SchedD or Collector daemon can discover secrets that could allow them to control other users' jobs and/or read their data. | |||||
CVE-2021-25312 | 1 Wisc | 1 Htcondor | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
HTCondor before 8.9.11 allows a user to submit a job as another user on the system, because of a flaw in the IDTOKENS authentication method. | |||||
CVE-2021-25311 | 1 Wisc | 1 Htcondor | 2024-11-21 | 9.0 HIGH | 9.9 CRITICAL |
condor_credd in HTCondor before 8.9.11 allows Directory Traversal outside the SEC_CREDENTIAL_DIRECTORY_OAUTH directory, as demonstrated by creating a file under /etc that will later be executed by root. | |||||
CVE-2019-18823 | 2 Fedoraproject, Wisc | 2 Fedora, Htcondor | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
HTCondor up to and including stable series 8.8.6 and development series 8.9.4 has Incorrect Access Control. It is possible to use a different authentication method to submit a job than the administrator has specified. If the administrator has configured the READ or WRITE methods to include CLAIMTOBE, then it is possible to impersonate another user to the condor_schedd. (For example to submit or remove jobs) | |||||
CVE-2017-16816 | 1 Wisc | 1 Htcondor | 2024-11-21 | 4.0 MEDIUM | 6.5 MEDIUM |
The condor_schedd component in HTCondor before 8.6.8 and 8.7.x before 8.7.5 allows remote authenticated users to cause a denial of service (daemon crash) by leveraging use of GSI and VOMS extensions. | |||||
CVE-2014-8126 | 1 Wisc | 1 Htcondor | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
The scheduler in HTCondor before 8.2.6 allows remote authenticated users to execute arbitrary code. | |||||
CVE-2012-3490 | 1 Wisc | 1 Htcondor | 2024-11-21 | 9.0 HIGH | 8.8 HIGH |
The (1) my_popenv_impl and (2) my_spawnv functions in src/condor_utils/my_popen.cpp and the (3) systemCommand function in condor_vm-gahp/vmgahp_common.cpp in Condor 7.6.x before 7.6.10 and 7.8.x before 7.8.4 does not properly check the return value of setuid calls, which might cause a subprocess to be created with root privileges and allow remote attackers to gain privileges via unspecified vectors. |