First published: Thu Jul 31 2008(Updated: )
Condor before 7.0.4 does not properly handle wildcards in the ALLOW_WRITE, DENY_WRITE, HOSTALLOW_WRITE, or HOSTDENY_WRITE configuration variables in authorization policy lists, which might allow remote attackers to bypass intended access restrictions.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
HTCondor | <=7.0.4 | |
HTCondor | =7.0.0 | |
HTCondor | =7.0.1 | |
HTCondor | =7.0.2 | |
HTCondor | =7.0.3 | |
HTCondor | <7.0.4 | |
Fedora | =9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-3424 has been classified as a high-severity vulnerability due to its potential to allow unauthorized access.
To fix CVE-2008-3424, upgrade Condor to version 7.0.4 or higher, which addresses the wildcard handling issue.
CVE-2008-3424 affects Condor versions prior to 7.0.4 and certain Fedora 9 installations.
Yes, CVE-2008-3424 can be exploited remotely by attackers to bypass intended access restrictions.
CVE-2008-3424 undermines the effectiveness of authorization policies by allowing wildcard bypasses in critical configuration variables.