Cumin in Red Hat Enterprise Messaging, Realtime, and Grid (MRG) 2.0 records broker authentication credentials in a log file, which allows local users to bypass authentication and perform unauthorized actions on jobs and message queues via a direct connection to the broker.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Enterprise_mrg | Redhat | 2.0 (including) | 2.0 (including) |
Condor | Ubuntu | lucid | * |
Condor | Ubuntu | maverick | * |
Condor | Ubuntu | natty | * |
Condor | Ubuntu | oneiric | * |
MRG for RHEL-5 v. 2 | RedHat | condor-0:7.6.3-0.3.el5 | * |
MRG for RHEL-5 v. 2 | RedHat | condor-ec2-enhanced-0:1.2-2.el5 | * |
MRG for RHEL-5 v. 2 | RedHat | condor-ec2-enhanced-hooks-0:1.2-3.el5 | * |
MRG for RHEL-5 v. 2 | RedHat | condor-job-hooks-0:1.5-4.el5 | * |
MRG for RHEL-5 v. 2 | RedHat | condor-low-latency-0:1.2-2.el5 | * |
MRG for RHEL-5 v. 2 | RedHat | condor-wallaby-0:4.1-4.el5 | * |
MRG for RHEL-5 v. 2 | RedHat | condor-wallaby-base-db-0:1.14-1.el5 | * |
MRG for RHEL-5 v. 2 | RedHat | cumin-0:0.1.4916-1.el5 | * |
MRG for RHEL-5 v. 2 | RedHat | ruby-rhubarb-0:0.4.0-1.el5 | * |
MRG for RHEL-5 v. 2 | RedHat | wallaby-0:0.10.5-6.el5 | * |
Red Hat Enterprise MRG 2 | RedHat | condor-0:7.6.3-0.3.el6 | * |
Red Hat Enterprise MRG 2 | RedHat | condor-ec2-enhanced-0:1.2-2.el6 | * |
Red Hat Enterprise MRG 2 | RedHat | condor-ec2-enhanced-hooks-0:1.2-3.el6 | * |
Red Hat Enterprise MRG 2 | RedHat | condor-job-hooks-0:1.5-4.el6 | * |
Red Hat Enterprise MRG 2 | RedHat | condor-low-latency-0:1.2-2.el6 | * |
Red Hat Enterprise MRG 2 | RedHat | condor-wallaby-0:4.1-4.el6 | * |
Red Hat Enterprise MRG 2 | RedHat | condor-wallaby-base-db-0:1.14-1.el6 | * |
Red Hat Enterprise MRG 2 | RedHat | cumin-0:0.1.4916-1.el6 | * |
Red Hat Enterprise MRG 2 | RedHat | ruby-rhubarb-0:0.4.0-1.el6 | * |
Red Hat Enterprise MRG 2 | RedHat | wallaby-0:0.10.5-6.el6 | * |