Computer Security
[EN] securityvulns.ru no-pyccku


torque authentication bypass
updated since 13.10.2013
Published:18.11.2013
Source:
SecurityVulns ID:13367
Type:remote
Threat Level:
6/10
Description:It's possible to queue code execution by connecting directly to pbs_mom port. Shell characters vulnerability.
Affected:TORQUE : Terascale Open-Source Resource and Queue Manager 2.5
 TORQUE : Terascale Open-Source Resource and Queue Manager 4.0
CVE:CVE-2013-4495 (The send_the_mail function in server/svr_mail.c in Terascale Open-Source Resource and Queue Manager (aka TORQUE Resource Manager) before 4.2.6 allows remote attackers to execute arbitrary commands via shell metacharacters in the email (-M switch) to qsub.)
 CVE-2013-4319 (pbs_mom in Terascale Open-Source Resource and Queue Manager (aka TORQUE Resource Manager) 2.5.x, 4.x, and earlier does not properly restrict access by unprivileged ports, which allows remote authenticated users to execute arbitrary jobs by submitting a command.)
Original documentdocumentDEBIAN, [SECURITY] [DSA 2796-1] torque security update (18.11.2013)
 documentDEBIAN, [SECURITY] [DSA 2770-1] torque security update (13.10.2013)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod