Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-5410

Опубликовано: 16 авг. 2016
Источник: redhat
CVSS3: 6.1
CVSS2: 4.4

Описание

firewalld.py in firewalld before 0.4.3.3 allows local users to bypass authentication and modify firewall configurations via the (1) addPassthrough, (2) removePassthrough, (3) addEntry, (4) removeEntry, or (5) setEntries D-Bus API method.

A flaw was found in the way firewalld allowed certain firewall configurations to be modified by unauthenticated users. Any locally logged in user could use this flaw to tamper or change firewall settings.

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-306
https://bugzilla.redhat.com/show_bug.cgi?id=1360135firewalld: Firewall configuration can be modified by any logged in user

6.1 Medium

CVSS3

4.4 Medium

CVSS2

Связанные уязвимости

CVSS3: 5.5
ubuntu
почти 9 лет назад

firewalld.py in firewalld before 0.4.3.3 allows local users to bypass authentication and modify firewall configurations via the (1) addPassthrough, (2) removePassthrough, (3) addEntry, (4) removeEntry, or (5) setEntries D-Bus API method.

CVSS3: 5.5
nvd
почти 9 лет назад

firewalld.py in firewalld before 0.4.3.3 allows local users to bypass authentication and modify firewall configurations via the (1) addPassthrough, (2) removePassthrough, (3) addEntry, (4) removeEntry, or (5) setEntries D-Bus API method.

CVSS3: 5.5
debian
почти 9 лет назад

firewalld.py in firewalld before 0.4.3.3 allows local users to bypass ...

CVSS3: 5.5
github
больше 3 лет назад

firewalld.py in firewalld before 0.4.3.3 allows local users to bypass authentication and modify firewall configurations via the (1) addPassthrough, (2) removePassthrough, (3) addEntry, (4) removeEntry, or (5) setEntries D-Bus API method.

oracle-oval
около 9 лет назад

ELSA-2016-2597: firewalld security, bug fix, and enhancement update (MODERATE)

6.1 Medium

CVSS3

4.4 Medium

CVSS2