{
  "threat_severity" : "Moderate",
  "public_date" : "2012-09-19T00:00:00Z",
  "bugzilla" : {
    "description" : "condor: does not check return value of setuid and similar calls, exploitable via VMware support",
    "id" : "848212",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=848212"
  },
  "cvss" : {
    "cvss_base_score" : "4.6",
    "cvss_scoring_vector" : "AV:N/AC:H/Au:S/C:P/I:P/A:P",
    "status" : "draft"
  },
  "details" : [ "The (1) my_popenv_impl and (2) my_spawnv functions in src/condor_utils/my_popen.cpp and the (3) systemCommand function in condor_vm-gahp/vmgahp_common.cpp in Condor 7.6.x before 7.6.10 and 7.8.x before 7.8.4 does not properly check the return value of setuid calls, which might cause a subprocess to be created with root privileges and allow remote attackers to gain privileges via unspecified vectors." ],
  "statement" : "Not vulnerable.  This issue did not affect the versions of condor as shipped with Red Hat Enterprise MRG as it does not include the vulnerable code (VMware support is not compiled in).",
  "acknowledgement" : "This issue was discovered by Florian Weimer (Red Hat Product Security Team).",
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise MRG 2",
    "fix_state" : "Not affected",
    "package_name" : "condor",
    "cpe" : "cpe:/a:redhat:enterprise_mrg:2"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2012-3490\nhttps://nvd.nist.gov/vuln/detail/CVE-2012-3490" ],
  "name" : "CVE-2012-3490",
  "csaw" : false
}