oss-sec mailing list archives
CVE request: Torque privilege escalation
From: Agostino Sarubbo <ago () gentoo org>
Date: Mon, 09 Sep 2013 12:14:51 +0200
From the torque advisory
http://www.supercluster.org/pipermail/torqueusers/2013-September/016098.html : *Vulnerability:* A non-privileged user who can run jobs or login to a node running pbs_server or pbs_mom can submit an arbitrary job to the cluster; that job can run as root. The user can submit a command directly to a pbs_mom daemon to queue and run a job. A malicious user could use this vulnerability to remotely execute code as root on the cluster. *Versions Affected:* All versions of TORQUE *Mitigating Factors:* - The user must be logged in on a node that is already legitimately able to contact pbs_mom daemons or submit jobs. - If a user submits a job via this defect and pbs_server is running, pbs_server will kill the job unless job syncing is disabled. It may take up to 45 seconds for pbs_server to kill the job. - There are no known instances of this vulnerability being exploited. -- Agostino Sarubbo Gentoo Linux Developer
Current thread:
- CVE request: Torque privilege escalation Agostino Sarubbo (Sep 09)
- Re: CVE request: Torque privilege escalation Kurt Seifried (Sep 09)
- Re: CVE request: Torque privilege escalation Agostino Sarubbo (Sep 09)
- Re: CVE request: Torque privilege escalation Kurt Seifried (Sep 09)
- Re: CVE request: Torque privilege escalation Agostino Sarubbo (Sep 09)
- Re: CVE request: Torque privilege escalation Kurt Seifried (Sep 09)