firewalld.py in firewalld before 0.4.3.3 allows local users to bypass authentication and modify firewall configurations via the (1) addPassthrough, (2) removePassthrough, (3) addEntry, (4) removeEntry, or (5) setEntries D-Bus API method.
References
Link | Resource |
---|---|
https://security.gentoo.org/glsa/201701-70 | Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBJMYLGRVKIPJEI3VZJ4WQZT7FBQ5BKO/ | Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DPM3GUQRU2KPRXDEQLAMCDQEAIARJSBT/ | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1360135 | Issue Tracking Patch |
http://www.securityfocus.com/bid/92481 | Third Party Advisory VDB Entry |
http://www.openwall.com/lists/oss-security/2016/08/16/3 | Mailing List |
http://www.firewalld.org/2016/08/firewalld-0-4-3-3-release | Patch Vendor Advisory |
http://rhn.redhat.com/errata/RHSA-2016-2597.html | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2017-04-19 07:59
Updated : 2017-04-25 07:59
NVD link : CVE-2016-5410
Mitre link : CVE-2016-5410
JSON object : View
CWE
CWE-287
Improper Authentication
Products Affected
redhat
- enterprise_linux_desktop
- enterprise_linux_hpc_node
- enterprise_linux_workstation
- enterprise_linux_server
firewalld
- firewalld