CONDOR-2008-0003
Summary: |
|
||||||||||||||||||||||||
User supplied input to |
|||||||||||||||||||||||||
| |||||||||||||||||||||||||
Access Required: |
local ordinary user with a condor authorization |
||||||||||||||||||||||||
This vulnerability requires local access on a machine where the user has write authorization to the condor_schedd (i.e., a host and account where the user can submit a job). |
|||||||||||||||||||||||||
Effort Required: |
medium |
||||||||||||||||||||||||
The use of ordinary condor command line tools is all that is required to exploit this vulnerability to cause a crash, running arbitrary code would require an experienced attacker if it is possible. |
|||||||||||||||||||||||||
Impact/Consequences: |
medium |
||||||||||||||||||||||||
The simplest effect of exploiting this vulnerability is a minor denial of service. It may be possible for a skilled attacker to run code as the condor user or root on the machine which would have a high impact. |
|||||||||||||||||||||||||
Full Details: |
|
||||||||||||||||||||||||
The administrator of the Condor system can set attributes of the form
SCHEDD_ROUND_ATTR_attr_name. These names are used to group attribute
values during negotiation. When a new attribute value is inserted by the
user when submitting a job or by using This overflow may result in the condor_schedd crashing which is then automatically restarted, resulting in a small period of denial of service. It is possible that a carefully crafted input could result in the execution of arbitrary code. |
|||||||||||||||||||||||||
Cause: |
buffer overflow |
||||||||||||||||||||||||
This vulnerability is caused by a buffer overflow. The overflow occurs
because the length of the source is not verified to be smaller than the
destination, and by using the dangerous function |
|||||||||||||||||||||||||
Actual Fix: |
|
||||||||||||||||||||||||
The vulnerability was fixed by using the function |