The filesystem authentication (condor_io/condor_auth_fs.cpp) in Condor 7.6.x before 7.6.10 and 7.8.x before 7.8.4 uses authentication directories even when they have weak permissions, which allows remote attackers to impersonate users by renaming a user’s authentication directory.
condor-git.cs.wisc.edu/?p=condor.git;a=commitdiff;h=1db67805
research.cs.wisc.edu/condor/manual/v7.6/8_3Stable_Release.html
research.cs.wisc.edu/condor/manual/v7.8/9_3Stable_Release.html
rhn.redhat.com/errata/RHSA-2012-1278.html
rhn.redhat.com/errata/RHSA-2012-1281.html
secunia.com/advisories/50666
www.openwall.com/lists/oss-security/2012/09/20/9
www.securityfocus.com/bid/55632
bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-3492