First published: Mon Sep 10 2018(Updated: )
An authorization flaw was found in Pacemaker before 1.1.16, where it did not properly guard its IPC interface. An attacker with an unprivileged account on a Pacemaker node could use this flaw to, for example, force the Local Resource Manager daemon to execute a script as root and thereby gain root access on the machine.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Clusterlabs Pacemaker | <=1.1.16 | |
Redhat Enterprise Linux Server | =6.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Server Eus | =7.3 | |
Redhat Enterprise Linux Server Eus | =7.4 | |
Redhat Enterprise Linux Server Eus | =7.5 | |
Redhat Enterprise Linux Server Eus | =7.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this flaw is CVE-2016-7035.
CVE-2016-7035 has a severity score of 7.8 (high).
Clusterlabs Pacemaker versions up to and including 1.1.16, Redhat Enterprise Linux Server versions 6.0, 7.0, Redhat Enterprise Linux Server Eus versions 7.3, 7.4, 7.5, and 7.6 are affected by this vulnerability.
An attacker with an unprivileged account on a Pacemaker node could use this vulnerability to force the Local Resource Manager daemon to execute a script as root and gain root access.
The CWE ID for this vulnerability is CWE-285.