First published: Wed Oct 08 2008(Updated: )
Condor before 7.0.5 does not properly handle when the configuration specifies overlapping netmasks in allow or deny rules, which causes the rule to be ignored and allows attackers to bypass intended access restrictions.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
HTCondor | <=7.0.4 | |
HTCondor | =6.8.0 | |
HTCondor | =6.8.1 | |
HTCondor | =6.8.2 | |
HTCondor | =6.8.3 | |
HTCondor | =6.8.4 | |
HTCondor | =6.8.5 | |
HTCondor | =6.8.6 | |
HTCondor | =6.8.7 | |
HTCondor | =6.8.8 | |
HTCondor | =6.8.9 | |
HTCondor | =7.0.0 | |
HTCondor | =7.0.1 | |
HTCondor | =7.0.2 | |
HTCondor | =7.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-3830 is classified as a medium severity vulnerability due to its potential to allow unauthorized access.
To fix CVE-2008-3830, upgrade to HTCondor version 7.0.5 or later.
CVE-2008-3830 affects HTCondor versions up to 7.0.4 and all 6.8.x versions.
CVE-2008-3830 exploits the improper handling of overlapping netmasks in allow or deny rules.
Yes, CVE-2008-3830 can potentially lead to unauthorized access, which may result in data breaches.