vulnerability

Red Hat: CVE-2016-7035: Important: pacemaker security update ((Multiple Advisories))

Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
Nov 3, 2016
Added
Nov 7, 2016
Modified
Jan 8, 2019

Description

Details for this vulnerability have not been published by NIST at this point. Descriptions from software vendor advisories for this issue are provided below.


From RHSA-2016:2675:


The Pacemaker cluster resource manager is a collection of technologies working together to provide data integrity and the ability to maintain application availability in the event of a failure.


Security Fix(es):


An authorization flaw was found in Pacemaker, where it did not properly guard its IPC interface. An attacker with an unprivileged account on a Pacemaker node could use this flaw to, for example, force the Local Resource Manager daemon to execute a script as root and thereby gain root access on the machine. (CVE-2016-7035)


This issue was discovered by Jan "poki" Pokorny (Red Hat) and Alain Moulle (ATOS/BULL).

Solutions

redhat-upgrade-pacemakerredhat-upgrade-pacemaker-cliredhat-upgrade-pacemaker-cluster-libsredhat-upgrade-pacemaker-ctsredhat-upgrade-pacemaker-debuginforedhat-upgrade-pacemaker-docredhat-upgrade-pacemaker-libsredhat-upgrade-pacemaker-libs-develredhat-upgrade-pacemaker-nagios-plugins-metadataredhat-upgrade-pacemaker-remote
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.