First published: Sat Aug 25 2012(Updated: )
Condor before 7.8.2 allows remote attackers to bypass host-based authentication and execute actions such as ALLOW_ADMINISTRATOR or ALLOW_WRITE by connecting from a system with a spoofed reverse DNS hostname.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Condor Project Condor | <=7.8.1 | |
Condor Project Condor | =6.5.4 | |
Condor Project Condor | =6.8.0 | |
Condor Project Condor | =6.8.1 | |
Condor Project Condor | =6.8.2 | |
Condor Project Condor | =6.8.3 | |
Condor Project Condor | =6.8.4 | |
Condor Project Condor | =6.8.5 | |
Condor Project Condor | =6.8.6 | |
Condor Project Condor | =6.8.7 | |
Condor Project Condor | =6.8.8 | |
Condor Project Condor | =6.8.9 | |
Condor Project Condor | =7.00 | |
Condor Project Condor | =7.0.0 | |
Condor Project Condor | =7.0.1 | |
Condor Project Condor | =7.0.2 | |
Condor Project Condor | =7.0.3 | |
Condor Project Condor | =7.0.4 | |
Condor Project Condor | =7.0.5 | |
Condor Project Condor | =7.0.6 | |
Condor Project Condor | =7.01 | |
Condor Project Condor | =7.1.0 | |
Condor Project Condor | =7.1.1 | |
Condor Project Condor | =7.1.2 | |
Condor Project Condor | =7.1.3 | |
Condor Project Condor | =7.1.4 | |
Condor Project Condor | =7.02 | |
Condor Project Condor | =7.2.0 | |
Condor Project Condor | =7.2.1 | |
Condor Project Condor | =7.2.2 | |
Condor Project Condor | =7.2.3 | |
Condor Project Condor | =7.2.4 | |
Condor Project Condor | =7.03 | |
Condor Project Condor | =7.3.0 | |
Condor Project Condor | =7.3.1 | |
Condor Project Condor | =7.3.2 | |
Condor Project Condor | =7.4.0 | |
Condor Project Condor | =7.4.1 | |
Condor Project Condor | =7.8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.