firewalld.py in firewalld before 0.4.3.3 allows local users to bypass authentication and modify firewall configurations via the (1) addPassthrough, (2) removePassthrough, (3) addEntry, (4) removeEntry, or (5) setEntries D-Bus API method.
                
            References
                    | Link | Resource | 
|---|---|
| https://security.gentoo.org/glsa/201701-70 | Third Party Advisory | 
| https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBJMYLGRVKIPJEI3VZJ4WQZT7FBQ5BKO/ | Third Party Advisory | 
| https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DPM3GUQRU2KPRXDEQLAMCDQEAIARJSBT/ | Third Party Advisory | 
| https://bugzilla.redhat.com/show_bug.cgi?id=1360135 | Issue Tracking Patch | 
| http://www.securityfocus.com/bid/92481 | Third Party Advisory VDB Entry | 
| http://www.openwall.com/lists/oss-security/2016/08/16/3 | Mailing List | 
| http://www.firewalld.org/2016/08/firewalld-0-4-3-3-release | Patch Vendor Advisory | 
| http://rhn.redhat.com/errata/RHSA-2016-2597.html | Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
                                
                                
  | 
                        
Configuration 2 (hide)
                                
                                
  | 
                        
Information
                Published : 2017-04-19 07:59
Updated : 2017-04-25 07:59
NVD link : CVE-2016-5410
Mitre link : CVE-2016-5410
JSON object : View
CWE
                
                    
                        
                        CWE-287
                        
            Improper Authentication
Products Affected
                redhat
- enterprise_linux_desktop
 - enterprise_linux_hpc_node
 - enterprise_linux_workstation
 - enterprise_linux_server
 
firewalld
- firewalld
 


