Описание
Condor before 7.8.2 allows remote attackers to bypass host-based authentication and execute actions such as ALLOW_ADMINISTRATOR or ALLOW_WRITE by connecting from a system with a spoofed reverse DNS hostname.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 7.8.2~dfsg.1-1 |
| hardy | DNE | |
| lucid | ignored | end of life |
| natty | ignored | end of life |
| oneiric | ignored | end of life |
| precise | DNE | |
| quantal | not-affected | 7.8.2~dfsg.1-1 |
| raring | not-affected | 7.8.2~dfsg.1-1 |
| saucy | not-affected | 7.8.2~dfsg.1-1 |
| upstream | released | 7.8.2~dfsg.1-1 |
Показывать по
10 Critical
CVSS2
Связанные уязвимости
Condor before 7.8.2 allows remote attackers to bypass host-based authentication and execute actions such as ALLOW_ADMINISTRATOR or ALLOW_WRITE by connecting from a system with a spoofed reverse DNS hostname.
Condor before 7.8.2 allows remote attackers to bypass host-based authentication and execute actions such as ALLOW_ADMINISTRATOR or ALLOW_WRITE by connecting from a system with a spoofed reverse DNS hostname.
Condor before 7.8.2 allows remote attackers to bypass host-based authe ...
Condor before 7.8.2 allows remote attackers to bypass host-based authentication and execute actions such as ALLOW_ADMINISTRATOR or ALLOW_WRITE by connecting from a system with a spoofed reverse DNS hostname.
10 Critical
CVSS2