[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250038

 
 

909

 
 

195843

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-2796-1 torque -- arbitrary code execution

ID: oval:org.secpod.oval:def:601145Date: (C)2014-01-08   (M)2022-10-10
Class: PATCHFamily: unix




Matt Ezell from Oak Ridge National Labs reported a vulnerability in torque, a PBS-derived batch processing queueing system. A user could submit executable shell commands on the tail of what is passed with the -M switch for qsub. This was later passed to a pipe, making it possible for these commands to be executed as root on the pbs_server.

Platform:
Debian 7.0
Debian 6.0
Product:
torque-client
Reference:
DSA-2796-1
CVE-2013-4495
CVE    1
CVE-2013-4495
CPE    3
cpe:/a:clusterresources:torque-client
cpe:/o:debian:debian_linux:6.0
cpe:/o:debian:debian_linux:7.0

© SecPod Technologies