Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-5410

Опубликовано: 16 авг. 2016
Источник: redhat
CVSS3: 6.1
CVSS2: 4.4
EPSS Низкий

Описание

firewalld.py in firewalld before 0.4.3.3 allows local users to bypass authentication and modify firewall configurations via the (1) addPassthrough, (2) removePassthrough, (3) addEntry, (4) removeEntry, or (5) setEntries D-Bus API method.

A flaw was found in the way firewalld allowed certain firewall configurations to be modified by unauthenticated users. Any locally logged in user could use this flaw to tamper or change firewall settings.

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-306
https://bugzilla.redhat.com/show_bug.cgi?id=1360135firewalld: Firewall configuration can be modified by any logged in user

EPSS

Процентиль: 19%
0.0006
Низкий

6.1 Medium

CVSS3

4.4 Medium

CVSS2

Связанные уязвимости

CVSS3: 5.5
ubuntu
больше 8 лет назад

firewalld.py in firewalld before 0.4.3.3 allows local users to bypass authentication and modify firewall configurations via the (1) addPassthrough, (2) removePassthrough, (3) addEntry, (4) removeEntry, or (5) setEntries D-Bus API method.

CVSS3: 5.5
nvd
больше 8 лет назад

firewalld.py in firewalld before 0.4.3.3 allows local users to bypass authentication and modify firewall configurations via the (1) addPassthrough, (2) removePassthrough, (3) addEntry, (4) removeEntry, or (5) setEntries D-Bus API method.

CVSS3: 5.5
debian
больше 8 лет назад

firewalld.py in firewalld before 0.4.3.3 allows local users to bypass ...

CVSS3: 5.5
github
больше 3 лет назад

firewalld.py in firewalld before 0.4.3.3 allows local users to bypass authentication and modify firewall configurations via the (1) addPassthrough, (2) removePassthrough, (3) addEntry, (4) removeEntry, or (5) setEntries D-Bus API method.

oracle-oval
почти 9 лет назад

ELSA-2016-2597: firewalld security, bug fix, and enhancement update (MODERATE)

EPSS

Процентиль: 19%
0.0006
Низкий

6.1 Medium

CVSS3

4.4 Medium

CVSS2