CONDOR-2008-0003
| Summary: | 
 | ||||||||||||||||||||||||
| 
  User supplied input to  | |||||||||||||||||||||||||
| 
 | |||||||||||||||||||||||||
| Access Required: | local ordinary user with a condor authorization | ||||||||||||||||||||||||
| This vulnerability requires local access on a machine where the user has write authorization to the condor_schedd (i.e., a host and account where the user can submit a job). | |||||||||||||||||||||||||
| Effort Required: | medium | ||||||||||||||||||||||||
| The use of ordinary condor command line tools is all that is required to exploit this vulnerability to cause a crash, running arbitrary code would require an experienced attacker if it is possible. | |||||||||||||||||||||||||
| Impact/Consequences: | medium | ||||||||||||||||||||||||
| The simplest effect of exploiting this vulnerability is a minor denial of service. It may be possible for a skilled attacker to run code as the condor user or root on the machine which would have a high impact. | |||||||||||||||||||||||||
| Full Details: | 
 | ||||||||||||||||||||||||
| 
  The administrator of the Condor system can set attributes of the form
  SCHEDD_ROUND_ATTR_attr_name.  These names are used to group attribute
  values during negotiation.  When a new attribute value is inserted by the
  user when submitting a job or by using  This overflow may result in the condor_schedd crashing which is then automatically restarted, resulting in a small period of denial of service. It is possible that a carefully crafted input could result in the execution of arbitrary code. | |||||||||||||||||||||||||
| Cause: | buffer overflow | ||||||||||||||||||||||||
| 
  This vulnerability is caused by a buffer overflow.  The overflow occurs
  because the length of the source is not verified to be smaller than the
  destination, and by using the dangerous function  | |||||||||||||||||||||||||
| Actual Fix: | 
 | ||||||||||||||||||||||||
| 
  The vulnerability was fixed by using the function  | |||||||||||||||||||||||||
