First published: Thu Jan 09 2020(Updated: )
The (1) my_popenv_impl and (2) my_spawnv functions in src/condor_utils/my_popen.cpp and the (3) systemCommand function in condor_vm-gahp/vmgahp_common.cpp in Condor 7.6.x before 7.6.10 and 7.8.x before 7.8.4 does not properly check the return value of setuid calls, which might cause a subprocess to be created with root privileges and allow remote attackers to gain privileges via unspecified vectors.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
HTCondor | >=7.6.0<7.6.10 | |
HTCondor | >=7.8.0<7.8.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-3490 is classified as a high-severity vulnerability due to improper return value checks on setuid calls.
To mitigate CVE-2012-3490, upgrade HTCondor to versions 7.6.10 or later, or 7.8.4 or later.
CVE-2012-3490 affects HTCondor versions prior to 7.6.10 and 7.8.4.
CVE-2012-3490 involves the my_popenv_impl, my_spawnv, and systemCommand functions.
Exploitation of CVE-2012-3490 may allow unauthorized subprocess execution due to improper privilege management.