Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2012-3492

Опубликовано: 28 сент. 2012
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 6.4

Описание

The filesystem authentication (condor_io/condor_auth_fs.cpp) in Condor 7.6.x before 7.6.10 and 7.8.x before 7.8.4 uses authentication directories even when they have weak permissions, which allows remote attackers to impersonate users by renaming a user's authentication directory.

РелизСтатусПримечание
devel

not-affected

7.8.2~dfsg.1-1+deb7u1
hardy

DNE

lucid

ignored

end of life
natty

ignored

end of life
oneiric

ignored

end of life
precise

DNE

quantal

not-affected

7.8.2~dfsg.1-1+deb7u1
raring

not-affected

7.8.2~dfsg.1-1+deb7u1
saucy

not-affected

7.8.2~dfsg.1-1+deb7u1
upstream

needs-triage

Показывать по

EPSS

Процентиль: 71%
0.00698
Низкий

6.4 Medium

CVSS2

Связанные уязвимости

redhat
больше 13 лет назад

The filesystem authentication (condor_io/condor_auth_fs.cpp) in Condor 7.6.x before 7.6.10 and 7.8.x before 7.8.4 uses authentication directories even when they have weak permissions, which allows remote attackers to impersonate users by renaming a user's authentication directory.

nvd
больше 13 лет назад

The filesystem authentication (condor_io/condor_auth_fs.cpp) in Condor 7.6.x before 7.6.10 and 7.8.x before 7.8.4 uses authentication directories even when they have weak permissions, which allows remote attackers to impersonate users by renaming a user's authentication directory.

debian
больше 13 лет назад

The filesystem authentication (condor_io/condor_auth_fs.cpp) in Condor ...

github
больше 3 лет назад

The filesystem authentication (condor_io/condor_auth_fs.cpp) in Condor 7.6.x before 7.6.10 and 7.8.x before 7.8.4 uses authentication directories even when they have weak permissions, which allows remote attackers to impersonate users by renaming a user's authentication directory.

EPSS

Процентиль: 71%
0.00698
Низкий

6.4 Medium

CVSS2