{"id":"CVE-2012-3416","details":"Condor before 7.8.2 allows remote attackers to bypass host-based authentication and execute actions such as ALLOW_ADMINISTRATOR or ALLOW_WRITE by connecting from a system with a spoofed reverse DNS hostname.","modified":"2026-04-10T03:44:17.721637Z","published":"2012-08-25T10:29:50Z","references":[{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2012-1168.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2012-1169.html"},{"type":"ADVISORY","url":"http://secunia.com/advisories/50246"},{"type":"ADVISORY","url":"http://secunia.com/advisories/50294"},{"type":"WEB","url":"http://osvdb.org/84766"},{"type":"WEB","url":"http://research.cs.wisc.edu/condor/security/vulnerabilities/CONDOR-2012-0002.html"},{"type":"WEB","url":"http://www.securityfocus.com/bid/55032"},{"type":"WEB","url":"http://www.securitytracker.com/id?1027395"},{"type":"WEB","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/77748"}],"schema_version":"1.7.5"}