Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-16877

Опубликовано: 17 апр. 2019
Источник: redhat
CVSS3: 8.8

Описание

A flaw was found in the way pacemaker's client-server authentication was implemented in versions up to and including 2.0.0. A local attacker could use this flaw, and combine it with other IPC weaknesses, to achieve local privilege escalation.

A flaw was found in the way pacemaker's client-server authentication was implemented. A local attacker could use this flaw, and combine it with other IPC weaknesses, to achieve local privilege escalation.

Отчет

This is essentially a design level security flaw which can be combined with other flaws to achieve local privilege escalation for clusters running pacemaker. The attacker needs to have access to the cluster node running pacemaker (AV:L). The attacker can use easily use the design flaw via the confused deputy problem to run the exploit (AC:L), also needs to have login access to the pacemaker node to run the exploit (PR:L). Due to the elevated privileges obtained, there is an impact to the system beyond the pacemaker node itself (S:C). Lastly due to the attacker's ability to run arbitrary code as root, confidentiality, integrity, and availability of the system is affected. (CIA:H)

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6pacemakerWill not fix
Red Hat Storage 3pacemakerWill not fix
Red Hat Enterprise Linux 7pacemakerFixedRHSA-2019:127827.05.2019
Red Hat Enterprise Linux 8pacemakerFixedRHSA-2019:127927.05.2019

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-287
https://bugzilla.redhat.com/show_bug.cgi?id=1652646pacemaker: Insufficient local IPC client-server authentication on the client's side can lead to local privesc

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 7 лет назад

A flaw was found in the way pacemaker's client-server authentication was implemented in versions up to and including 2.0.0. A local attacker could use this flaw, and combine it with other IPC weaknesses, to achieve local privilege escalation.

CVSS3: 7.8
nvd
почти 7 лет назад

A flaw was found in the way pacemaker's client-server authentication was implemented in versions up to and including 2.0.0. A local attacker could use this flaw, and combine it with other IPC weaknesses, to achieve local privilege escalation.

CVSS3: 7.8
debian
почти 7 лет назад

A flaw was found in the way pacemaker's client-server authentication w ...

CVSS3: 7.8
github
больше 3 лет назад

A flaw was found in the way pacemaker's client-server authentication was implemented in versions up to and including 2.0.0. A local attacker could use this flaw, and combine it with other IPC weaknesses, to achieve local privilege escalation.

fstec
около 7 лет назад

Уязвимость программного средства управления ресурсами кластера Pacemaker операционных систем Ubuntu, Fedora, OpenSUSE Leap, Enterprise Linux и Oracle Linux, позволяющая нарушителю повысить свои привилегии

8.8 High

CVSS3