First published: Tue Jan 31 2017(Updated: )
Salt before 2015.5.10 and 2015.8.x before 2015.8.8, when PAM external authentication is enabled, allows attackers to bypass the configured authentication service by passing an alternate service with a command sent to LocalClient.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SaltStack Salt | <=2015.5.9 | |
SaltStack Salt | =2015.8.0 | |
SaltStack Salt | =2015.8.1 | |
SaltStack Salt | =2015.8.2 | |
SaltStack Salt | =2015.8.3 | |
SaltStack Salt | =2015.8.4 | |
SaltStack Salt | =2015.8.5 | |
SaltStack Salt | =2015.8.7 | |
pip/salt | >=2015.8<2015.8.8 | 2015.8.8 |
pip/salt | <2015.5.10 | 2015.5.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3176 is considered a high-severity vulnerability that enables authentication bypass in SaltStack.
To fix CVE-2016-3176, upgrade to Salt version 2015.5.10 or 2015.8.8 or later.
CVE-2016-3176 affects SaltStack versions prior to 2015.5.10 and 2015.8.8.
CVE-2016-3176 allows attackers to bypass authentication by submitting an alternate service command to LocalClient.
Yes, CVE-2016-3176 affects multiple versions including 2015.5.9 and all 2015.8.x versions prior to 2015.8.8.