6.5
CVSSv2

CVE-2014-8126

Published: 31/01/2020 Updated: 05/02/2020
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 578
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

The scheduler in HTCondor prior to 8.2.6 allows remote authenticated users to execute arbitrary code.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

wisc htcondor

Vendor Advisories

Debian Bug report logs - #775276 condor: CVE-2014-8126 Package: condor; Maintainer for condor is HTCondor Developers <condor-debian@cswiscedu>; Source for condor is src:condor (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@inutilorg> Date: Tue, 13 Jan 2015 13:54:02 UTC Severity: grave Tags: fixed-upst ...
Synopsis Important: condor security update Type/Severity Security Advisory: Important Topic Updated condor packages that fix one security issue are now available forRed Hat Enterprise MRG 25 for Red Hat Enterprise Linux 5Red Hat Product Security has rated this update as having Important securityimpact A ...
Synopsis Important: condor security update Type/Severity Security Advisory: Important Topic Updated condor packages that fix one security issue are now available forRed Hat Enterprise MRG 25 for Red Hat Enterprise Linux 6Red Hat Product Security has rated this update as having Important securityimpact A ...
Florian Weimer, of Red Hat Product Security, discovered an issue in condor, a distributed workload management system Upon job completion, it can optionally notify a user by sending an email; the mailx invocation used in that process allowed for any authenticated user able to submit jobs, to execute arbitrary code with the privileges of the condor ...
Impact: Important Public Date: 2015-01-12 CWE: CWE-78 Bugzilla: 1169800: CVE-2014-8126 condor: mailx in ...