CVE Vulnerabilities

CVE-2011-2925

Improper Authentication

Published: Sep 20, 2011 | Modified: Apr 11, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
4.6 MEDIUM
AV:L/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
3.6 MODERATE
AV:L/AC:L/Au:N/C:P/I:P/A:N
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Cumin in Red Hat Enterprise Messaging, Realtime, and Grid (MRG) 2.0 records broker authentication credentials in a log file, which allows local users to bypass authentication and perform unauthorized actions on jobs and message queues via a direct connection to the broker.

Weakness

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

Affected Software

NameVendorStart VersionEnd Version
Enterprise_mrgRedhat2.0 (including)2.0 (including)
MRG for RHEL-5 v. 2RedHatcondor-0:7.6.3-0.3.el5*
MRG for RHEL-5 v. 2RedHatcondor-ec2-enhanced-0:1.2-2.el5*
MRG for RHEL-5 v. 2RedHatcondor-ec2-enhanced-hooks-0:1.2-3.el5*
MRG for RHEL-5 v. 2RedHatcondor-job-hooks-0:1.5-4.el5*
MRG for RHEL-5 v. 2RedHatcondor-low-latency-0:1.2-2.el5*
MRG for RHEL-5 v. 2RedHatcondor-wallaby-0:4.1-4.el5*
MRG for RHEL-5 v. 2RedHatcondor-wallaby-base-db-0:1.14-1.el5*
MRG for RHEL-5 v. 2RedHatcumin-0:0.1.4916-1.el5*
MRG for RHEL-5 v. 2RedHatruby-rhubarb-0:0.4.0-1.el5*
MRG for RHEL-5 v. 2RedHatwallaby-0:0.10.5-6.el5*
Red Hat Enterprise MRG 2RedHatcondor-0:7.6.3-0.3.el6*
Red Hat Enterprise MRG 2RedHatcondor-ec2-enhanced-0:1.2-2.el6*
Red Hat Enterprise MRG 2RedHatcondor-ec2-enhanced-hooks-0:1.2-3.el6*
Red Hat Enterprise MRG 2RedHatcondor-job-hooks-0:1.5-4.el6*
Red Hat Enterprise MRG 2RedHatcondor-low-latency-0:1.2-2.el6*
Red Hat Enterprise MRG 2RedHatcondor-wallaby-0:4.1-4.el6*
Red Hat Enterprise MRG 2RedHatcondor-wallaby-base-db-0:1.14-1.el6*
Red Hat Enterprise MRG 2RedHatcumin-0:0.1.4916-1.el6*
Red Hat Enterprise MRG 2RedHatruby-rhubarb-0:0.4.0-1.el6*
Red Hat Enterprise MRG 2RedHatwallaby-0:0.10.5-6.el6*
CondorUbuntulucid*
CondorUbuntumaverick*
CondorUbuntunatty*
CondorUbuntuoneiric*

Potential Mitigations

References