[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250038

 
 

909

 
 

195843

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-2770-1 torque -- authentication bypass

ID: oval:org.secpod.oval:def:601119Date: (C)2013-10-10   (M)2022-10-10
Class: PATCHFamily: unix




John Fitzpatrick of MWR InfoSecurity discovered an authentication bypass vulnerability in torque, a PBS-derived batch processing queueing system. The torque authentication model revolves around the use of privileged ports. If a request is not made from a privileged port then it is assumed not to be trusted or authenticated. It was found that pbs_mom does not perform a check to ensure that connections are established from a privileged port. A user who can run jobs or login to a node running pbs_server or pbs_mom can exploit this vulnerability to remotely execute code as root on the cluster by submitting a command directly to a pbs_mom daemon to queue and run a job.

Platform:
Debian 7.0
Debian 6.0
Product:
torque-client
Reference:
DSA-2770-1
CVE-2013-4319
CVE    1
CVE-2013-4319
CPE    3
cpe:/a:clusterresources:torque-client
cpe:/o:debian:debian_linux:6.0
cpe:/o:debian:debian_linux:7.0

© SecPod Technologies