Vulnerability Details : CVE-2012-3493
The command_give_request_ad function in condor_startd.V6/command.cpp Condor 7.6.x before 7.6.10 and 7.8.x before 7.8.4 allows remote attackers to obtain sensitive information, and possibly control or start arbitrary jobs, via a ClassAd request to the condor_startd port, which leaks the ClaimId.
Vulnerability category: Information leak
Exploit prediction scoring system (EPSS) score for CVE-2012-3493
Probability of exploitation activity in the next 30 days: 0.39%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 73 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2012-3493
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:N |
8.6
|
4.9
|
NIST |
CWE ids for CVE-2012-3493
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-3493
-
http://research.cs.wisc.edu/condor/manual/v7.6/8_3Stable_Release.html
8.3 Stable Release Series 7.6
-
http://research.cs.wisc.edu/condor/manual/v7.8/9_3Stable_Release.html
9.3 Stable Release Series 7.8
-
http://condor-git.cs.wisc.edu/?p=condor.git;a=commitdiff;h=d2f33972
HTCondor Git - condor.git/commitdiff
-
https://bugzilla.redhat.com/show_bug.cgi?id=848222
848222 – (CVE-2012-3493) CVE-2012-3493 condor: GIVE_REQUEST_AD leaks privileged ClaimId information
-
http://rhn.redhat.com/errata/RHSA-2012-1281.html
RHSA-2012:1281 - Security Advisory - Red Hat Customer PortalVendor Advisory
-
http://www.securityfocus.com/bid/55632
Condor Multiple Security Bypass Vulnerabilities
-
http://rhn.redhat.com/errata/RHSA-2012-1278.html
RHSA-2012:1278 - Security Advisory - Red Hat Customer PortalVendor Advisory
-
http://www.openwall.com/lists/oss-security/2012/09/20/9
oss-security - Notification of upstream Condor security fixes
Products affected by CVE-2012-3493
- cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*
- cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*
- cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*
- cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*
- cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*
- cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*
- cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*
- cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*
- cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*
- cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*
- cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*