CVE Vulnerabilities

CVE-2011-2925

Improper Authentication

Published: Sep 20, 2011 | Modified: Jul 15, 2021
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
4.6 MEDIUM
AV:L/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
3.6 MODERATE
AV:L/AC:L/Au:N/C:P/I:P/A:N
RedHat/V3
Ubuntu

Cumin in Red Hat Enterprise Messaging, Realtime, and Grid (MRG) 2.0 records broker authentication credentials in a log file, which allows local users to bypass authentication and perform unauthorized actions on jobs and message queues via a direct connection to the broker.

Weakness

When an actor claims to have a given identity, the software does not prove or insufficiently proves that the claim is correct.

Affected Software

Name Vendor Start Version End Version
Enterprise_mrg Redhat 2.0 2.0
MRG for RHEL-5 v. 2 RedHat condor-0:7.6.3-0.3.el5 *
MRG for RHEL-5 v. 2 RedHat condor-ec2-enhanced-0:1.2-2.el5 *
MRG for RHEL-5 v. 2 RedHat condor-ec2-enhanced-hooks-0:1.2-3.el5 *
MRG for RHEL-5 v. 2 RedHat condor-job-hooks-0:1.5-4.el5 *
MRG for RHEL-5 v. 2 RedHat condor-low-latency-0:1.2-2.el5 *
MRG for RHEL-5 v. 2 RedHat condor-wallaby-0:4.1-4.el5 *
MRG for RHEL-5 v. 2 RedHat condor-wallaby-base-db-0:1.14-1.el5 *
MRG for RHEL-5 v. 2 RedHat cumin-0:0.1.4916-1.el5 *
MRG for RHEL-5 v. 2 RedHat ruby-rhubarb-0:0.4.0-1.el5 *
MRG for RHEL-5 v. 2 RedHat wallaby-0:0.10.5-6.el5 *
Red Hat Enterprise MRG 2 RedHat condor-0:7.6.3-0.3.el6 *
Red Hat Enterprise MRG 2 RedHat condor-ec2-enhanced-0:1.2-2.el6 *
Red Hat Enterprise MRG 2 RedHat condor-ec2-enhanced-hooks-0:1.2-3.el6 *
Red Hat Enterprise MRG 2 RedHat condor-job-hooks-0:1.5-4.el6 *
Red Hat Enterprise MRG 2 RedHat condor-low-latency-0:1.2-2.el6 *
Red Hat Enterprise MRG 2 RedHat condor-wallaby-0:4.1-4.el6 *
Red Hat Enterprise MRG 2 RedHat condor-wallaby-base-db-0:1.14-1.el6 *
Red Hat Enterprise MRG 2 RedHat cumin-0:0.1.4916-1.el6 *
Red Hat Enterprise MRG 2 RedHat ruby-rhubarb-0:0.4.0-1.el6 *
Red Hat Enterprise MRG 2 RedHat wallaby-0:0.10.5-6.el6 *
Condor Ubuntu lucid *
Condor Ubuntu maverick *
Condor Ubuntu natty *
Condor Ubuntu oneiric *

Potential Mitigations

References