Executive Summary

Summary
Title oar security update
Informations
Name DSA-3543 First vendor Publication 2016-04-05
Vendor Debian Last vendor Modification 2016-04-05
Severity (Vendor) N/A Revision 1

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:S/C:C/I:C/A:C)
Cvss Base Score 9 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 8 Authentication Requires single instance
Calculate full CVSS 2.0 Vectors scores

Detail

Emmanuel Thome discovered that missing sanitising in the oarsh command of OAR, a software used to manage jobs and resources of HPC clusters, could result in privilege escalation.

For the oldstable distribution (wheezy), this problem has been fixed in version 2.5.2-3+deb7u1.

For the stable distribution (jessie), this problem has been fixed in version 2.5.4-2+deb8u1.

For the unstable distribution (sid), this problem has been fixed in version 2.5.7-1.

We recommend that you upgrade your oar packages.

Original Source

Url : http://www.debian.org/security/2016/dsa-3543

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-264 Permissions, Privileges, and Access Controls

CPE : Common Platform Enumeration

TypeDescriptionCount
Os 1

Nessus® Vulnerability Scanner

Date Description
2016-04-07 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-3543.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
Date Informations
2016-04-15 05:29:38
  • Multiple Updates
2016-04-11 21:30:25
  • Multiple Updates
2016-04-08 13:24:01
  • Multiple Updates
2016-04-05 21:23:27
  • First insertion