CVE-2012-3416
25.08.2012, 10:29
Condor before 7.8.2 allows remote attackers to bypass host-based authentication and execute actions such as ALLOW_ADMINISTRATOR or ALLOW_WRITE by connecting from a system with a spoofed reverse DNS hostname.Enginsight
Vendor | Product | Version |
---|---|---|
condor_project | condor | 𝑥 ≤ 7.8.1 |
condor_project | condor | 6.5.4 |
condor_project | condor | 6.8.0 |
condor_project | condor | 6.8.1 |
condor_project | condor | 6.8.2 |
condor_project | condor | 6.8.3 |
condor_project | condor | 6.8.4 |
condor_project | condor | 6.8.5 |
condor_project | condor | 6.8.6 |
condor_project | condor | 6.8.7 |
condor_project | condor | 6.8.8 |
condor_project | condor | 6.8.9 |
condor_project | condor | 7.00 |
condor_project | condor | 7.0.0 |
condor_project | condor | 7.0.1 |
condor_project | condor | 7.0.2 |
condor_project | condor | 7.0.3 |
condor_project | condor | 7.0.4 |
condor_project | condor | 7.0.5 |
condor_project | condor | 7.0.6 |
condor_project | condor | 7.01 |
condor_project | condor | 7.1.0 |
condor_project | condor | 7.1.1 |
condor_project | condor | 7.1.2 |
condor_project | condor | 7.1.3 |
condor_project | condor | 7.1.4 |
condor_project | condor | 7.02 |
condor_project | condor | 7.2.0 |
condor_project | condor | 7.2.1 |
condor_project | condor | 7.2.2 |
condor_project | condor | 7.2.3 |
condor_project | condor | 7.2.4 |
condor_project | condor | 7.03 |
condor_project | condor | 7.3.0 |
condor_project | condor | 7.3.1 |
condor_project | condor | 7.3.2 |
condor_project | condor | 7.4.0 |
condor_project | condor | 7.4.1 |
condor_project | condor | 7.8.0 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Common Weakness Enumeration
References