RSS   Vulnerabilities for 'Torque resource manager'   RSS

2014-10-30
 
CVE-2014-3684

 

 
The tm_adopt function in lib/Libifl/tm.c in Terascale Open-Source Resource and Queue Manager (aka TORQUE Resource Manager) 5.0.x, 4.5.x, 4.2.x, and earlier does not validate that the owner of the process also owns the adopted session id, which allows remote authenticated users to kill arbitrary processes via a crafted executable.

 
2014-05-16
 
CVE-2014-0749

CWE-119
 

 
Stack-based buffer overflow in lib/Libdis/disrsi_.c in Terascale Open-Source Resource and Queue Manager (aka TORQUE Resource Manager) 2.5.x through 2.5.13 allows remote attackers to execute arbitrary code via a large count value.

 
2013-11-20
 
CVE-2013-4495

 

 
The send_the_mail function in server/svr_mail.c in Terascale Open-Source Resource and Queue Manager (aka TORQUE Resource Manager) before 4.2.6 allows remote attackers to execute arbitrary commands via shell metacharacters in the email (-M switch) to qsub.

 
2013-10-11
 
CVE-2013-4319

CWE-264
 

 
pbs_mom in Terascale Open-Source Resource and Queue Manager (aka TORQUE Resource Manager) 2.5.x, 4.x, and earlier does not properly restrict access by unprivileged ports, which allows remote authenticated users to execute arbitrary jobs by submitting a command.

 

 >>> Vendor: Adaptivecomputing 2 Products
Torque resource manager
MOAB


Copyright 2019, cxsecurity.com

 

Back to Top