firewalld.py in firewalld before 0.4.3.3 allows local users to bypass authentication and modify firewall configurations via the (1) addPassthrough, (2) removePassthrough, (3) addEntry, (4) removeEntry, or (5) setEntries D-Bus API method.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 02:54
Type | Values Removed | Values Added |
---|---|---|
References | () http://rhn.redhat.com/errata/RHSA-2016-2597.html - Third Party Advisory | |
References | () http://www.firewalld.org/2016/08/firewalld-0-4-3-3-release - Patch, Vendor Advisory | |
References | () http://www.openwall.com/lists/oss-security/2016/08/16/3 - Mailing List | |
References | () http://www.securityfocus.com/bid/92481 - Third Party Advisory, VDB Entry | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1360135 - Issue Tracking, Patch | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DPM3GUQRU2KPRXDEQLAMCDQEAIARJSBT/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZBJMYLGRVKIPJEI3VZJ4WQZT7FBQ5BKO/ - | |
References | () https://security.gentoo.org/glsa/201701-70 - Third Party Advisory |
07 Nov 2023, 02:33
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2017-04-19 14:59
Updated : 2024-11-21 02:54
NVD link : CVE-2016-5410
Mitre link : CVE-2016-5410
CVE.ORG link : CVE-2016-5410
JSON object : View
Products Affected
redhat
- enterprise_linux_server
- enterprise_linux_desktop
- enterprise_linux_hpc_node
- enterprise_linux_workstation
firewalld
- firewalld
CWE
CWE-287
Improper Authentication