First published: Fri Jan 04 2013(Updated: )
A denial of service flaw was found in the way Pacemaker, an advanced, scalable high-availability cluster resource manager for Linux-HA (Heartbeat) and/or Corosync, performed authentication and processing of remote connections in certain circumstances. In general Pacemaker used a blocking socket (without a timeout) to wait for authentication credentials to arrive. When Pacemaker was configured to allow remote Cluster Information Base (CIB) cluster's configuration / cluster's resources management, a remote attacker could use this flaw to cause Pacemaker to block indefinitely (preventing it from serving another requests). Important Note: In the default configuration of Pacemaker in Red Hat Enterprise Linux 6 the remote CIB management feature / functionality is turned off.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Enterprise Linux | =6.0 | |
Clusterlabs Pacemaker Command Line Interface | =1.1.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-0281 is classified as a denial of service vulnerability.
To fix CVE-2013-0281, update Pacemaker to version 1.1.11 or later.
CVE-2013-0281 affects Red Hat Enterprise Linux 6.0 and Pacemaker version 1.1.10.
Exploitation of CVE-2013-0281 can lead to a denial of service, impacting the availability of managed resources.
CVE-2013-0281 is not classified as critical but still poses a significant risk to service availability.