First published: Wed Sep 26 2012(Updated: )
Daniel Horák discovered that condor_schedd would crash when attempting to remove a job via /usr/share/condor/aviary/jobcontrol.py with CPROC in square brackets (e.g. "jobcontrol.py --cmd=removeJob --cproc=[1.0]"). If the aviary_query_server is configured to listen to public interfaces, this could allow a remote attacker to cause a denial of service condition in condor_schedd. While condor_schedd will be restarted by the condor_master process after it exits, condor_master will throttle back restarts each crash. This will slowly increment to the defined MASTER_BACKOFF_CEILING value (defaults to 3600s, or 1 hour). In the recommended configuration scenario (deployed in a secure manner to prevent the aviary_query_server being exposed to unauthenticated users), this DoS can only be triggered by authenticated users, however they do not need the ADMINISTRATOR privilege to cause condor_schedd to halt.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Condor Project Condor | =7.8.0 | |
Redhat Enterprise Mrg | =2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.