Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-7035

Опубликовано: 03 нояб. 2016
Источник: redhat
CVSS3: 8.8
CVSS2: 7.2
EPSS Низкий

Описание

An authorization flaw was found in Pacemaker before 1.1.16, where it did not properly guard its IPC interface. An attacker with an unprivileged account on a Pacemaker node could use this flaw to, for example, force the Local Resource Manager daemon to execute a script as root and thereby gain root access on the machine.

An authorization flaw was found in Pacemaker, where it did not properly guard its IPC interface. An attacker with an unprivileged account on a Pacemaker node could use this flaw to, for example, force the Local Resource Manager daemon to execute a script as root and thereby gain root access on the machine.

Дополнительная информация

Статус:

Important
Дефект:
CWE-285
https://bugzilla.redhat.com/show_bug.cgi?id=1369732pacemaker: Privilege escalation due to improper guarding of IPC communication

EPSS

Процентиль: 29%
0.00103
Низкий

8.8 High

CVSS3

7.2 High

CVSS2

Связанные уязвимости

CVSS3: 8.8
ubuntu
больше 7 лет назад

An authorization flaw was found in Pacemaker before 1.1.16, where it did not properly guard its IPC interface. An attacker with an unprivileged account on a Pacemaker node could use this flaw to, for example, force the Local Resource Manager daemon to execute a script as root and thereby gain root access on the machine.

CVSS3: 8.8
nvd
больше 7 лет назад

An authorization flaw was found in Pacemaker before 1.1.16, where it did not properly guard its IPC interface. An attacker with an unprivileged account on a Pacemaker node could use this flaw to, for example, force the Local Resource Manager daemon to execute a script as root and thereby gain root access on the machine.

CVSS3: 8.8
debian
больше 7 лет назад

An authorization flaw was found in Pacemaker before 1.1.16, where it d ...

CVSS3: 7.8
github
больше 3 лет назад

An authorization flaw was found in Pacemaker before 1.1.16, where it did not properly guard its IPC interface. An attacker with an unprivileged account on a Pacemaker node could use this flaw to, for example, force the Local Resource Manager daemon to execute a script as root and thereby gain root access on the machine.

suse-cvrf
около 9 лет назад

Security update for pacemaker

EPSS

Процентиль: 29%
0.00103
Низкий

8.8 High

CVSS3

7.2 High

CVSS2