CONDOR-2008-0004
Summary: |
|
||||||||||||||||||||||||
User supplied input to |
|||||||||||||||||||||||||
| |||||||||||||||||||||||||
Access Required: |
local ordinary user with a condor authorization |
||||||||||||||||||||||||
This vulnerability requires local access on a machine where the user has write authorization to the condor_schedd (i.e., a host and account where the user can submit a job). |
|||||||||||||||||||||||||
Effort Required: |
medium |
||||||||||||||||||||||||
The use of ordinary condor command line tools is all that is required in the first step of this vulnerability. A successful attack would then need the condor_schedd to restart which would require administrative privilege or another vulnerability. |
|||||||||||||||||||||||||
Impact/Consequences: |
medium |
||||||||||||||||||||||||
The effect of exploiting this vulnerability is that the condor_schedd will not be able to recover from a crash or restart without manual intervention. |
|||||||||||||||||||||||||
Full Details: |
|
||||||||||||||||||||||||
A user can use When the job queue log file is read upon restart recovery the illegal value is detected and the condor_schedd is aborted. This will occur each time the condor_schedd is restarted (by a condor_schedd crash, such as CONDOR-2008-0003, or waiting for routine maintenance) until the offending log record is removed the from the log file by hand. For instance the command
will write the following log record to job queue log
(
|
|||||||||||||||||||||||||
Cause: |
injection |
||||||||||||||||||||||||
This vulnerability is caused by a user being able to inject an invalid log record into the job queue log. When this record is later read the system deals with the invalid record by aborting. |
|||||||||||||||||||||||||
Actual Fix: |
|
||||||||||||||||||||||||
When an attribute value is encountered where the value is the empty string,
the value is replaced with the string |