Vulnerability Bulletins |
Aumento de privilegios en Condor |
|
Vulnerability classification |
|
Property | Value |
Confidence level | Oficial |
Impact | Aumento de privilegios |
Dificulty | Experto |
Required attacker level | Acceso remoto con cuenta |
System information |
|
Property | Value |
Affected manufacturer | GNU/Linux |
Affected software |
Condor 6.5.4 - 7.2.4 Condor 7.3.x y 7.4.0 |
Description |
|
Se ha descubierto una vulnerabilidad en Condor. Un atacante remoto podría aumentar privilegios mediante el intérprete de comandos de Condor para modificar atributos de procesos arbitrarios. |
|
Solution |
|
Actualización de software Red Hat (RHSA-2009:1688-1) Red Hat Enterprise MRG v1 for Enterprise Linux AS (version 4) Red Hat Enterprise MRG v1 for Enterprise Linux ES (version 4) https://rhn.redhat.com/ Red Hat (RHSA-2009:1689-1) Red Hat Enterprise MRG v1 for Red Hat Enterprise Linux (version 5) https://rhn.redhat.com/ |
|
Standar resources |
|
Property | Value |
CVE | CVE-2009-4133 |
BID | 37443 |
Other resources |
|
Red Hat Security Advisory (RHSA-2009:1688-1) https://rhn.redhat.com/errata/RHSA-2009-1688.html Red Hat Security Advisory (RHSA-2009:1689-1) https://rhn.redhat.com/errata/RHSA-2009-1689.html |
Version history |
||
Version | Comments | Date |
1.0 | Aviso emitido | 2009-12-29 |