CVE-2012-4462
The MITRE CVE dictionary describes this issue as:
Find out more about CVE-2012-4462 from the MITRE CVE dictionary dictionary and NIST NVD.
Statement
The Red Hat Security Response Team has rated this issue as having low security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.
CVSS v2 metrics
| Base Score | 3.5 |
|---|---|
| Base Metrics | AV:N/AC:M/Au:S/C:N/I:N/A:P |
| Access Vector | Network |
| Access Complexity | Medium |
| Authentication | Single |
| Confidentiality Impact | None |
| Integrity Impact | None |
| Availability Impact | Partial |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Red Hat Security Errata
| Platform | Errata | Release Date |
|---|---|---|
| Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2 (condor) | RHSA-2013:0565 | 2013-03-06 |
| MRG Grid for RHEL 5 Server v.2 (condor) | RHSA-2013:0564 | 2013-03-06 |
| Red Hat MRG Grid for RHEL 6 Server v.2 (condor) | RHSA-2013:0565 | 2013-03-06 |
Affected Packages State
| Platform | Package | State |
|---|---|---|
| Red Hat Enterprise MRG 1 | condor | Will not fix |
Acknowledgements
This issue was discovered by Daniel Horak of the Red Hat Enterprise MRG Quality Engineering Team.CVE description copyright © 2017, The MITRE Corporation
