First published: Mon Sep 10 2018(Updated: )
An authorization flaw was found in Pacemaker before 1.1.16, where it did not properly guard its IPC interface. An attacker with an unprivileged account on a Pacemaker node could use this flaw to, for example, force the Local Resource Manager daemon to execute a script as root and thereby gain root access on the machine.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
CentOS Pacemaker-libs | <=1.1.16 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Server | =7.3 | |
Red Hat Enterprise Linux Server | =7.4 | |
Red Hat Enterprise Linux Server | =7.5 | |
Red Hat Enterprise Linux Server | =7.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this flaw is CVE-2016-7035.
CVE-2016-7035 has a severity score of 7.8 (high).
Clusterlabs Pacemaker versions up to and including 1.1.16, Redhat Enterprise Linux Server versions 6.0, 7.0, Redhat Enterprise Linux Server Eus versions 7.3, 7.4, 7.5, and 7.6 are affected by this vulnerability.
An attacker with an unprivileged account on a Pacemaker node could use this vulnerability to force the Local Resource Manager daemon to execute a script as root and gain root access.
The CWE ID for this vulnerability is CWE-285.