Condor before 7.8.2 allows remote attackers to bypass host-based authentication and execute actions such as ALLOW_ADMINISTRATOR or ALLOW_WRITE by connecting from a system with a spoofed reverse DNS hostname.
https://exchange.xforce.ibmcloud.com/vulnerabilities/77748
http://www.securitytracker.com/id?1027395
http://www.securityfocus.com/bid/55032
http://secunia.com/advisories/50294
http://secunia.com/advisories/50246
http://rhn.redhat.com/errata/RHSA-2012-1169.html
http://rhn.redhat.com/errata/RHSA-2012-1168.html
http://research.cs.wisc.edu/condor/security/vulnerabilities/CONDOR-2012-0002.html