CVE-2016-5410

firewalld.py in firewalld before 0.4.3.3 allows local users to bypass authentication and modify firewall configurations via the (1) addPassthrough, (2) removePassthrough, (3) addEntry, (4) removeEntry, or (5) setEntries D-Bus API method.
Configurations

Configuration 1 (hide)

cpe:2.3:a:firewalld:firewalld:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

History

21 Nov 2024, 02:54

Type Values Removed Values Added
References () http://rhn.redhat.com/errata/RHSA-2016-2597.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2016-2597.html - Third Party Advisory
References () http://www.firewalld.org/2016/08/firewalld-0-4-3-3-release - Patch, Vendor Advisory () http://www.firewalld.org/2016/08/firewalld-0-4-3-3-release - Patch, Vendor Advisory
References () http://www.openwall.com/lists/oss-security/2016/08/16/3 - Mailing List () http://www.openwall.com/lists/oss-security/2016/08/16/3 - Mailing List
References () http://www.securityfocus.com/bid/92481 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/92481 - Third Party Advisory, VDB Entry
References () https://bugzilla.redhat.com/show_bug.cgi?id=1360135 - Issue Tracking, Patch () https://bugzilla.redhat.com/show_bug.cgi?id=1360135 - Issue Tracking, Patch
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DPM3GUQRU2KPRXDEQLAMCDQEAIARJSBT/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DPM3GUQRU2KPRXDEQLAMCDQEAIARJSBT/ -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZBJMYLGRVKIPJEI3VZJ4WQZT7FBQ5BKO/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZBJMYLGRVKIPJEI3VZJ4WQZT7FBQ5BKO/ -
References () https://security.gentoo.org/glsa/201701-70 - Third Party Advisory () https://security.gentoo.org/glsa/201701-70 - Third Party Advisory

07 Nov 2023, 02:33

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBJMYLGRVKIPJEI3VZJ4WQZT7FBQ5BKO/', 'name': 'FEDORA-2016-4dedc6ec3d', 'tags': ['Third Party Advisory'], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DPM3GUQRU2KPRXDEQLAMCDQEAIARJSBT/', 'name': 'FEDORA-2016-de55d2c2c9', 'tags': ['Third Party Advisory'], 'refsource': 'FEDORA'}
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DPM3GUQRU2KPRXDEQLAMCDQEAIARJSBT/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZBJMYLGRVKIPJEI3VZJ4WQZT7FBQ5BKO/ -

Information

Published : 2017-04-19 14:59

Updated : 2024-11-21 02:54


NVD link : CVE-2016-5410

Mitre link : CVE-2016-5410

CVE.ORG link : CVE-2016-5410


JSON object : View

Products Affected

redhat

  • enterprise_linux_server
  • enterprise_linux_desktop
  • enterprise_linux_hpc_node
  • enterprise_linux_workstation

firewalld

  • firewalld
CWE
CWE-287

Improper Authentication