exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 17 of 17 RSS Feed

Files

Torque 2.5.13 Buffer Overflow
Posted May 16, 2014
Authored by John Fitzpatrick

Torque versions 2.5.13 and below suffer from a buffer overflow vulnerability.

tags | advisory, overflow
advisories | CVE-2014-0749
SHA-256 | d70ac68760be26990412a9557c8ba8998fd61ae6ed3c065bbd16318b9e99b85a

Related Files

Mandriva Linux Security Advisory 2015-124
Posted Mar 30, 2015
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2015-124 - Chad Vizino reported that within a TORQUE Resource Manager job a non-root user could use a vulnerability in the tm_adopt() library call to kill processes he/she doesn't own including root-owned ones on any node in a job. This update implements the upstream fixes.

tags | advisory, root
systems | linux, mandriva
advisories | CVE-2014-3684
SHA-256 | 0b6cf337451bd08a3491d44990a5a552c523304d3702af295a7b53c842bd5444
Gentoo Linux Security Advisory 201412-47
Posted Dec 29, 2014
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201412-47 - Multiple vulnerabilities have been found in TORQUE Resource Manager, possibly resulting in escalation of privileges or remote code execution. Versions less than 4.1.7 are affected.

tags | advisory, remote, vulnerability, code execution
systems | linux, gentoo
advisories | CVE-2011-2193, CVE-2011-2907, CVE-2011-4925, CVE-2013-4319, CVE-2013-4495, CVE-2014-0749
SHA-256 | 51a42e443e73a67f0e0416d7e5cd284c78b89ddef4d31e82cd485c179c0087a4
Debian Security Advisory 3058-1
Posted Oct 27, 2014
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3058-1 - Chad Vizino reported a vulnerability in torque, a PBS-derived batch processing queueing system. A non-root user could exploit the flaw in the tm_adopt() library call to kill any process, including root-owned ones on any node in a job.

tags | advisory, root
systems | linux, debian
advisories | CVE-2014-3684
SHA-256 | 794e6fcde2a5edb7fde588274221b91b4eb16325a3b27ba4ad68854d85168f41
TORQUE Resource Manager 2.5.13 Buffer Overflow
Posted May 30, 2014
Authored by bwall

TORQUE Resource Manager versions 2.5.x through 2.5.13 suffer from a stack buffer overflow vulnerability.

tags | exploit, overflow
advisories | CVE-2014-0749
SHA-256 | 01db40756d23f2ac4bcfe60e33e9ff8f16a701a683f0b663f33585f704651449
Debian Security Advisory 2936-1
Posted May 23, 2014
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2936-1 - John Fitzpatrick from MWR Labs reported a stack-based buffer overflow vulnerability in torque, a PBS-derived batch processing queueing system. An unauthenticated remote attacker could exploit this flaw to execute arbitrary code with root privileges.

tags | advisory, remote, overflow, arbitrary, root
systems | linux, debian
advisories | CVE-2014-0749
SHA-256 | 000e95af2d290953506bcada622442d6062842c424e774b0871880778600207b
Debian Security Advisory 2796-1
Posted Nov 14, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2796-1 - Matt Ezell from Oak Ridge National Labs reported a vulnerability in torque, a PBS-derived batch processing queueing system.

tags | advisory
systems | linux, debian
advisories | CVE-2013-4495
SHA-256 | 8c1ab3f9d4ec34b474a39b54a38613b2324aa25e984e9b49b4c99b5a3a39637f
Debian Security Advisory 2770-1
Posted Oct 9, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2770-1 - John Fitzpatrick of MWR InfoSecurity discovered an authentication bypass vulnerability in torque, a PBS-derived batch processing queueing system.

tags | advisory, bypass
systems | linux, debian
advisories | CVE-2013-4319
SHA-256 | f2fdcb75a9312ce5e54011beca4f9336ca38ab399b314819a73d184a1bd429b0
Secunia Security Advisory 47381
Posted Jan 2, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in TORQUE, which can be exploited by malicious users to bypass certain security restrictions.

tags | advisory
SHA-256 | 0d0620b52fc6be45a55604fe59ddf6ca94d08cc71ef5952080a0913692365cd3
Debian Security Advisory 2329-1
Posted Oct 27, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2329-1 - Bartlomiej Balcerek discovered several buffer overflows in torque server, a PBS-derived batch processing server. This allows an attacker to crash the service or execute arbitrary code with privileges of the server via crafted job or host names.

tags | advisory, overflow, arbitrary
systems | linux, debian
advisories | CVE-2011-2193
SHA-256 | 5f42437f7d36f6cd8bdb547930c295a44714e4c3fb860357704edd6e75e86fbf
Secunia Security Advisory 46577
Posted Oct 27, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for torque. This fixes two vulnerabilities, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local, vulnerability
systems | linux, debian
SHA-256 | 1e11d6ea99c6064f81333e20e070414305a740305122bb042fbe6a11672eddcc
Secunia Security Advisory 45524
Posted Aug 11, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in TORQUE Resource Manager, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | 09a18adb762451157aaf7e193b7b3832b5e0f13d1ba889d3af0df1fa0e26f181
Torque Server Buffer Overflow
Posted Jul 14, 2011
Authored by Adam Zabrocki, Bartlomiej Balcerek, Maciej Kotowicz

Torque Server versions prior to 2.4.1.4 and 3.0.[0,1] suffer from a buffer overflow vulnerability.

tags | advisory, overflow
advisories | CVE-2011-2193
SHA-256 | d42dea2627d928ed2511106108e44d93bc90572f0feebc4a43a5e9fbfbcc8c7b
Secunia Security Advisory 45040
Posted Jun 22, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for torque. This fixes two vulnerabilities, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local, vulnerability
systems | linux, fedora
SHA-256 | 22ccbc54d9f5c3f698329d38b5c9cc0f6ecd62a58c9020a199ddf6eb271949ef
Secunia Security Advisory 45039
Posted Jun 22, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in TORQUE Resource Manager, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local, vulnerability
SHA-256 | f3a322462ace22c414b7b0c0cc483632ac1a6cdfb473a2747000d9cd8453c156
Secunia Security Advisory 39730
Posted May 13, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Torque Game Engine, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
SHA-256 | 5cfb5bb49db63212e504f4177d14cee68b4da8e3040df46dff706d5c7cbf9111
Gentoo Linux Security Advisory 200611-14
Posted Nov 21, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200611-14 - TORQUE creates temporary files with predictable names. Please note that the TORQUE package shipped in Gentoo Portage is not vulnerable in the default configuration. Only systems with more permissive access rights to the spool directory are vulnerable. Versions less than 2.1.2-r2 are affected.

tags | advisory
systems | linux, gentoo
SHA-256 | 57a4cb9abde1537e010e1f32a644fab74c9c7131b1112d5d7e9bb24e423b86e9
TORQUE-audit.pdf
Posted Oct 21, 2006
Authored by Luis Miguel Ferreira da Silva | Site csirt.fe.up.pt

A paper discussing a race condition vulnerability in a software package called TORQUE Resource Manager.

tags | advisory
SHA-256 | 8e3866e0319643aa29a9919eaa286e3471d96bfe045e873e7e743efd8891fb19
Page 1 of 1
Back1Next

File Archive:

February 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    11 Files
  • 2
    Feb 2nd
    9 Files
  • 3
    Feb 3rd
    5 Files
  • 4
    Feb 4th
    0 Files
  • 5
    Feb 5th
    0 Files
  • 6
    Feb 6th
    0 Files
  • 7
    Feb 7th
    0 Files
  • 8
    Feb 8th
    0 Files
  • 9
    Feb 9th
    0 Files
  • 10
    Feb 10th
    0 Files
  • 11
    Feb 11th
    0 Files
  • 12
    Feb 12th
    0 Files
  • 13
    Feb 13th
    0 Files
  • 14
    Feb 14th
    0 Files
  • 15
    Feb 15th
    0 Files
  • 16
    Feb 16th
    0 Files
  • 17
    Feb 17th
    0 Files
  • 18
    Feb 18th
    0 Files
  • 19
    Feb 19th
    0 Files
  • 20
    Feb 20th
    0 Files
  • 21
    Feb 21st
    0 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close