{"id":"CVE-2012-3492","details":"The filesystem authentication (condor_io/condor_auth_fs.cpp) in Condor 7.6.x before 7.6.10 and 7.8.x before 7.8.4 uses authentication directories even when they have weak permissions, which allows remote attackers to impersonate users by renaming a user's authentication directory.","modified":"2026-01-27T04:13:01.990381Z","published":"2012-09-28T17:55:01Z","withdrawn":"2026-01-27T04:13:01.990381Z","references":[{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2012-1278.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2012-1281.html"},{"type":"ADVISORY","url":"http://secunia.com/advisories/50666"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-3492"},{"type":"WEB","url":"http://condor-git.cs.wisc.edu/?p=condor.git%3Ba=commitdiff%3Bh=1db67805"},{"type":"WEB","url":"http://research.cs.wisc.edu/condor/manual/v7.6/8_3Stable_Release.html"},{"type":"WEB","url":"http://research.cs.wisc.edu/condor/manual/v7.8/9_3Stable_Release.html"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2012/09/20/9"},{"type":"WEB","url":"http://www.securityfocus.com/bid/55632"}],"schema_version":"1.7.3"}