Condor before 7.8.2 allows remote attackers to bypass host-based authentication and execute actions such as ALLOW_ADMINISTRATOR or ALLOW_WRITE by connecting from a system with a spoofed reverse DNS hostname.
osvdb.org/84766
research.cs.wisc.edu/condor/security/vulnerabilities/CONDOR-2012-0002.html
rhn.redhat.com/errata/RHSA-2012-1168.html
rhn.redhat.com/errata/RHSA-2012-1169.html
secunia.com/advisories/50246
secunia.com/advisories/50294
www.securityfocus.com/bid/55032
www.securitytracker.com/id?1027395
exchange.xforce.ibmcloud.com/vulnerabilities/77748