First published: Fri Dec 02 2011(Updated: )
Multiple format string flaws were found in Condor: a) when the XML message log format was requested in Condor submit job by remote Condor user and that user attempted to write a specially-crafted message into user log file via condor_hold tool it could lead to condor_schedd daemon crash, or, potentially arbitrary code execution with the privileges of the 'condor' user [*]. Also this way an attacker could potentially prevent other Condor jobs from being scheduled and ever executed, b) request for file transfer by remote Condor user to transmit a file, with specially-crafted name, could lead to child process of condor_schedd daemon to crash (repeated process, where condor_schedd daemon would fork a child process to handle the request, the child to crash, while trying to handle it and condor_schedd daemon to fork another child since the particular Condor job still have not been completed successfully). Upstream bug report (mentioning only one attack vector): [1] <a href="https://condor-wiki.cs.wisc.edu/index.cgi/tktview?tn=2660">https://condor-wiki.cs.wisc.edu/index.cgi/tktview?tn=2660</a> General upstream patch (addressing among these flaws also couple of compiler warning problems): [2] <a href="http://condor-git.cs.wisc.edu/?p=condor.git;a=commitdiff;h=5e5571d1a431eb3c61977b6dd6ec90186ef79867">http://condor-git.cs.wisc.edu/?p=condor.git;a=commitdiff;h=5e5571d1a431eb3c61977b6dd6ec90186ef79867</a> -- [*] Arbitrary code execution was possible only on systems, where Condor daemons were not compiled with FORTIFY_SOURCE protection mechanism. On systems with this protection enabled, particular flaw would lead to Condor service crash only.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
HTCondor | =7.6.1 | |
HTCondor | =7.2.3 | |
Fedora | =16 | |
HTCondor | =7.5.4 | |
HTCondor | =7.6.3 | |
HTCondor | =7.6.0 | |
HTCondor | =7.3.2 | |
HTCondor | =7.2.1 | |
HTCondor | =7.2.0 | |
HTCondor | =7.4.1 | |
HTCondor | =7.3.0 | |
HTCondor | =7.4.2 | |
HTCondor | =7.2.2 | |
HTCondor | =7.6.4 | |
HTCondor | =7.6.2 | |
Fedora | =15 | |
HTCondor | =7.2.5 | |
HTCondor | =7.4.0 | |
HTCondor | =7.3.1 | |
HTCondor | =7.2.4 | |
Red Hat Enterprise MRG | =1.3 | |
Red Hat Enterprise MRG | =2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-4930 is classified as having a moderate severity level due to potential crashes of the condor_schedd daemon.
To fix CVE-2011-4930, upgrade Condor to version 7.6.0 or later, as the vulnerability has been addressed in these releases.
CVE-2011-4930 affects Condor versions 7.2.0 through 7.5.4.
CVE-2011-4930 is a format string vulnerability that could lead to crashes of the Condor scheduling daemon.
Users of the affected Condor versions, especially those executing jobs via the condor_hold tool, are impacted by CVE-2011-4930.