6.8
CVSSv2

CVE-2014-3684

Published: 30/10/2014 Updated: 31/12/2016
CVSS v2 Base Score: 6.8 | Impact Score: 6.9 | Exploitability Score: 8
VMScore: 605
Vector: AV:N/AC:L/Au:S/C:N/I:N/A:C

Vulnerability Summary

The tm_adopt function in lib/Libifl/tm.c in Terascale Open-Source Resource and Queue Manager (aka TORQUE Resource Manager) 5.0.x, 4.5.x, 4.2.x, and previous versions does not validate that the owner of the process also owns the adopted session id, which allows remote authenticated users to kill arbitrary processes via a crafted executable.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

adaptivecomputing torque resource manager 5.0.0-1_43d8f09a

adaptivecomputing torque resource manager 4.2.4.1

adaptivecomputing torque resource manager 4.2.4

adaptivecomputing torque resource manager 4.2.9

adaptivecomputing torque resource manager 4.2.8

adaptivecomputing torque resource manager 4.2.3.1

adaptivecomputing torque resource manager 4.2.3

adaptivecomputing torque resource manager 4.2.7

adaptivecomputing torque resource manager 4.2.6.1

adaptivecomputing torque resource manager 4.2.6

adaptivecomputing torque resource manager 4.2.5

Vendor Advisories

Chad Vizino reported a vulnerability in torque, a PBS-derived batch processing queueing system A non-root user could exploit the flaw in the tm_adopt() library call to kill any process, including root-owned ones on any node in a job For the stable distribution (wheezy), this problem has been fixed in version 2416+dfsg-1+deb7u4 For the unstable ...