All the vulnerabilites related to firewalld - firewalld
Vulnerability from fkie_nvd
Published
2017-04-19 14:59
Modified
2024-11-21 02:54
Summary
firewalld.py in firewalld before 0.4.3.3 allows local users to bypass authentication and modify firewall configurations via the (1) addPassthrough, (2) removePassthrough, (3) addEntry, (4) removeEntry, or (5) setEntries D-Bus API method.
References
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2016-2597.htmlThird Party Advisory
secalert@redhat.comhttp://www.firewalld.org/2016/08/firewalld-0-4-3-3-releasePatch, Vendor Advisory
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2016/08/16/3Mailing List
secalert@redhat.comhttp://www.securityfocus.com/bid/92481Third Party Advisory, VDB Entry
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=1360135Issue Tracking, Patch
secalert@redhat.comhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DPM3GUQRU2KPRXDEQLAMCDQEAIARJSBT/
secalert@redhat.comhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZBJMYLGRVKIPJEI3VZJ4WQZT7FBQ5BKO/
secalert@redhat.comhttps://security.gentoo.org/glsa/201701-70Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-2597.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.firewalld.org/2016/08/firewalld-0-4-3-3-releasePatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2016/08/16/3Mailing List
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/92481Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=1360135Issue Tracking, Patch
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DPM3GUQRU2KPRXDEQLAMCDQEAIARJSBT/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZBJMYLGRVKIPJEI3VZJ4WQZT7FBQ5BKO/
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/201701-70Third Party Advisory



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:firewalld:firewalld:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "848D161A-5C16-4653-8A44-320409D9101E",
              "versionEndIncluding": "0.4.3.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C84489B-B08C-4854-8A12-D01B6E45CF79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "firewalld.py in firewalld before 0.4.3.3 allows local users to bypass authentication and modify firewall configurations via the (1) addPassthrough, (2) removePassthrough, (3) addEntry, (4) removeEntry, or (5) setEntries D-Bus API method."
    },
    {
      "lang": "es",
      "value": "firewalld.py en firewalld en versiones anteriores a 0.4.3.3 permite a usuarios locales eludir la autenticaci\u00f3n y modificar las configuraciones del firewall a trav\u00e9s de (1) addPassthrough, (2) removePassthrough, (3) addEntry, (4) removeEntry o (5) setEntries D-Bus API method."
    }
  ],
  "id": "CVE-2016-5410",
  "lastModified": "2024-11-21T02:54:15.697",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-04-19T14:59:00.207",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2016-2597.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.firewalld.org/2016/08/firewalld-0-4-3-3-release"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2016/08/16/3"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/92481"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1360135"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DPM3GUQRU2KPRXDEQLAMCDQEAIARJSBT/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZBJMYLGRVKIPJEI3VZJ4WQZT7FBQ5BKO/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/201701-70"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2016-2597.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.firewalld.org/2016/08/firewalld-0-4-3-3-release"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2016/08/16/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/92481"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1360135"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DPM3GUQRU2KPRXDEQLAMCDQEAIARJSBT/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZBJMYLGRVKIPJEI3VZJ4WQZT7FBQ5BKO/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/201701-70"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-287"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

cve-2016-5410
Vulnerability from cvelistv5
Published
2017-04-19 14:00
Modified
2024-08-06 01:01
Severity ?
Summary
firewalld.py in firewalld before 0.4.3.3 allows local users to bypass authentication and modify firewall configurations via the (1) addPassthrough, (2) removePassthrough, (3) addEntry, (4) removeEntry, or (5) setEntries D-Bus API method.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T01:01:00.114Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.firewalld.org/2016/08/firewalld-0-4-3-3-release"
          },
          {
            "name": "FEDORA-2016-4dedc6ec3d",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZBJMYLGRVKIPJEI3VZJ4WQZT7FBQ5BKO/"
          },
          {
            "name": "FEDORA-2016-de55d2c2c9",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DPM3GUQRU2KPRXDEQLAMCDQEAIARJSBT/"
          },
          {
            "name": "92481",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/92481"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1360135"
          },
          {
            "name": "GLSA-201701-70",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/201701-70"
          },
          {
            "name": "RHSA-2016:2597",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2016-2597.html"
          },
          {
            "name": "[oss-security] 20160816 firewalld: Firewall configuration can be modified by any logged in user",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2016/08/16/3"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-08-16T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "firewalld.py in firewalld before 0.4.3.3 allows local users to bypass authentication and modify firewall configurations via the (1) addPassthrough, (2) removePassthrough, (3) addEntry, (4) removeEntry, or (5) setEntries D-Bus API method."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-04-19T11:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.firewalld.org/2016/08/firewalld-0-4-3-3-release"
        },
        {
          "name": "FEDORA-2016-4dedc6ec3d",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZBJMYLGRVKIPJEI3VZJ4WQZT7FBQ5BKO/"
        },
        {
          "name": "FEDORA-2016-de55d2c2c9",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DPM3GUQRU2KPRXDEQLAMCDQEAIARJSBT/"
        },
        {
          "name": "92481",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/92481"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1360135"
        },
        {
          "name": "GLSA-201701-70",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/201701-70"
        },
        {
          "name": "RHSA-2016:2597",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2016-2597.html"
        },
        {
          "name": "[oss-security] 20160816 firewalld: Firewall configuration can be modified by any logged in user",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2016/08/16/3"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2016-5410",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "firewalld.py in firewalld before 0.4.3.3 allows local users to bypass authentication and modify firewall configurations via the (1) addPassthrough, (2) removePassthrough, (3) addEntry, (4) removeEntry, or (5) setEntries D-Bus API method."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.firewalld.org/2016/08/firewalld-0-4-3-3-release",
              "refsource": "CONFIRM",
              "url": "http://www.firewalld.org/2016/08/firewalld-0-4-3-3-release"
            },
            {
              "name": "FEDORA-2016-4dedc6ec3d",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBJMYLGRVKIPJEI3VZJ4WQZT7FBQ5BKO/"
            },
            {
              "name": "FEDORA-2016-de55d2c2c9",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DPM3GUQRU2KPRXDEQLAMCDQEAIARJSBT/"
            },
            {
              "name": "92481",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/92481"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1360135",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1360135"
            },
            {
              "name": "GLSA-201701-70",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/201701-70"
            },
            {
              "name": "RHSA-2016:2597",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2016-2597.html"
            },
            {
              "name": "[oss-security] 20160816 firewalld: Firewall configuration can be modified by any logged in user",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2016/08/16/3"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2016-5410",
    "datePublished": "2017-04-19T14:00:00",
    "dateReserved": "2016-06-10T00:00:00",
    "dateUpdated": "2024-08-06T01:01:00.114Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

var-201704-0407
Vulnerability from variot

firewalld.py in firewalld before 0.4.3.3 allows local users to bypass authentication and modify firewall configurations via the (1) addPassthrough, (2) removePassthrough, (3) addEntry, (4) removeEntry, or (5) setEntries D-Bus API method. FirewallD is prone to a security-bypass vulnerability. Attackers can exploit this issue to bypass certain security restrictions to perform unauthorized actions. This may aid in further attacks. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1

===================================================================== Red Hat Security Advisory

Synopsis: Moderate: firewalld security, bug fix, and enhancement update Advisory ID: RHSA-2016:2597-02 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-2597.html Issue date: 2016-11-03 CVE Names: CVE-2016-5410 =====================================================================

  1. Summary:

An update for firewalld is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

  1. Relevant releases/architectures:

Red Hat Enterprise Linux Client (v. 7) - noarch Red Hat Enterprise Linux Client Optional (v. 7) - noarch Red Hat Enterprise Linux ComputeNode (v. 7) - noarch Red Hat Enterprise Linux ComputeNode Optional (v. 7) - noarch Red Hat Enterprise Linux Server (v. 7) - noarch Red Hat Enterprise Linux Server Optional (v. 7) - noarch Red Hat Enterprise Linux Workstation (v. 7) - noarch Red Hat Enterprise Linux Workstation Optional (v. 7) - noarch

  1. Description:

firewalld is a firewall service daemon that provides a dynamic customizable firewall with a D-Bus interface.

The following packages have been upgraded to a newer upstream version: firewalld (0.4.3.2). Any locally logged in user could use this flaw to tamper or change firewall settings. (CVE-2016-5410)

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.3 Release Notes linked from the References section.

  1. Solution:

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

  1. Bugs fixed (https://bugzilla.redhat.com/):

1066037 - firewall-config should allow unspecifying zone binding for interface 1136801 - a rule added into IN__allow chain with 'permanent direct' interface doesn't exist after reload 1147500 - RFE: add command to firewall-cmd showing details of a service 1147951 - firewall-cmd should support a default logging option. 1219717 - Add radius TCP to policy. 1220196 - Firewalld missing policies for imap and smtps 1220467 - Option '--quiet' is needed in firewall-offline-cmd command line. 1237242 - Error: RT_TO_PERM_FAILED: zone 'dmz' : ZONE_CONFLICT when doing --runtime-to-permanent 1273296 - [ALL_LANG][firewalld] Translation incomplete 1273888 - Firewalld DefaultZone change breaking on --reload 1281416 - Headless firewall-config over ssh. firewall-config missing dependencies 1285769 - Fails to start without ip6t_rpfilter module 1292926 - firewalld --new-service & malformed xml ?? 1296573 - xsd specification nor service daemon checks whether tags are specified more than once if they must not 1301573 - firewalld reporting errors in logs for failed iptables commands 1302802 - Rebase to the new upstream and new release 1303026 - firewalld - mistake in renders ports remain closed, silently. 1305434 - Firewalld hangs with a NIS configuration 1313023 - command "systemctl reload firewalld" stops firewalld 1313845 - Backport After=dbus.service 1325335 - [RFE] allow negation of icmp-blocks zone configuration field 1326130 - firewalld stops traffic from/to 127.0.0.1 when masquerading is enabled in default zone 1326462 - rich rule with destination and no element give error 1347530 - Add port for corosync-qnetd to high-availability service 1349903 - FirewallD fails to parse direct rules with a lot of destination addresses 1357050 - exit codes don't match error messages in firewall-cmd 1360135 - CVE-2016-5410 firewalld: Firewall configuration can be modified by any logged in user 1360894 - Print errors and warnings to stderr 1365198 - firewall-cmd ipset --add-entries-from-file broken 1367038 - firewall-cmd crashes if /run/dbus/system_bus_socket does not exist 1368949 - Trying to get the description for a firewalld zone from command line throws error and prints traceback information. 1371116 - Load helper modules in FirewallZoneTransaction 1373260 - An error in the permanent direct rules will make all other direct rules using a table other than the filter table not applicable. 1374799 - exclude firewallctl from firewalld v0.4.3.2 update

  1. Package List:

Red Hat Enterprise Linux Client (v. 7):

Source: firewalld-0.4.3.2-8.el7.src.rpm

noarch: firewall-config-0.4.3.2-8.el7.noarch.rpm firewalld-0.4.3.2-8.el7.noarch.rpm firewalld-filesystem-0.4.3.2-8.el7.noarch.rpm python-firewall-0.4.3.2-8.el7.noarch.rpm

Red Hat Enterprise Linux Client Optional (v. 7):

noarch: firewall-applet-0.4.3.2-8.el7.noarch.rpm

Red Hat Enterprise Linux ComputeNode (v. 7):

Source: firewalld-0.4.3.2-8.el7.src.rpm

noarch: firewalld-0.4.3.2-8.el7.noarch.rpm firewalld-filesystem-0.4.3.2-8.el7.noarch.rpm python-firewall-0.4.3.2-8.el7.noarch.rpm

Red Hat Enterprise Linux ComputeNode Optional (v. 7):

noarch: firewall-applet-0.4.3.2-8.el7.noarch.rpm firewall-config-0.4.3.2-8.el7.noarch.rpm

Red Hat Enterprise Linux Server (v. 7):

Source: firewalld-0.4.3.2-8.el7.src.rpm

noarch: firewall-config-0.4.3.2-8.el7.noarch.rpm firewalld-0.4.3.2-8.el7.noarch.rpm firewalld-filesystem-0.4.3.2-8.el7.noarch.rpm python-firewall-0.4.3.2-8.el7.noarch.rpm

Red Hat Enterprise Linux Server Optional (v. 7):

noarch: firewall-applet-0.4.3.2-8.el7.noarch.rpm

Red Hat Enterprise Linux Workstation (v. 7):

Source: firewalld-0.4.3.2-8.el7.src.rpm

noarch: firewall-config-0.4.3.2-8.el7.noarch.rpm firewalld-0.4.3.2-8.el7.noarch.rpm firewalld-filesystem-0.4.3.2-8.el7.noarch.rpm python-firewall-0.4.3.2-8.el7.noarch.rpm

Red Hat Enterprise Linux Workstation Optional (v. 7):

noarch: firewall-applet-0.4.3.2-8.el7.noarch.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/

  1. References:

https://access.redhat.com/security/cve/CVE-2016-5410 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/7.3_Release_Notes/index.html

  1. Contact:

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/

Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1

iD8DBQFYGvz+XlSAg2UNWIIRAnYNAKC+tOJpkB9nwgqe+K/AaoZBzPX3RQCeM8De T81FpcV1vTa45DoiZC5wdUk= =+0pl -----END PGP SIGNATURE-----

-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce .


Gentoo Linux Security Advisory GLSA 201701-70


                                       https://security.gentoo.org/

Severity: Normal Title: Firewalld: Improper authentication methods Date: January 29, 2017 Bugs: #591458 ID: 201701-70


Synopsis

A vulnerability in Firewalld allows firewall configurations to be modified by unauthenticated users.

Background

Firewalld provides a dynamically managed firewall with support for network/firewall zones to define the trust level of network connections or interfaces. This is due to how Firewalld handles authentication via polkit which is not properly applied to 5 particular functions to include: addPassthrough, removePassthrough, addEntry, removeEntry, and setEntries.

Impact

A local attacker could tamper or change firewall settings leading to the additional exposure of systems to include unauthorized remote access.

Workaround

There is no known workaround at this time.

Resolution

All Firewalld users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=net-firewall/firewalld-0.4.3.3"=

References

[ 1 ] CVE-2016-5410 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5410

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

https://security.gentoo.org/glsa/201701-70

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

License

Copyright 2017 Gentoo Foundation, Inc; referenced text belongs to its owner(s).

The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5

--0Gjuansk3tW7pCmf5JAuWnfVtAeiNASDT--

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201704-0407",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "enterprise linux server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7.0"
      },
      {
        "model": "enterprise linux hpc node",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7.0"
      },
      {
        "model": "enterprise linux desktop",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7.0"
      },
      {
        "model": "enterprise linux workstation",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7.0"
      },
      {
        "model": "firewalld",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "firewalld",
        "version": "0.4.3.2"
      },
      {
        "model": "firewalld",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "firewalld",
        "version": "0.4.3.2"
      },
      {
        "model": "firewalld",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "firewalld",
        "version": "0.4.3.3"
      },
      {
        "model": "enterprise linux desktop",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "7.0"
      },
      {
        "model": "enterprise linux hpc node",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "7.0"
      },
      {
        "model": "enterprise linux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "7.0"
      },
      {
        "model": "enterprise linux workstation",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "7.0"
      },
      {
        "model": "linux",
        "scope": null,
        "trust": 0.3,
        "vendor": "gentoo",
        "version": null
      },
      {
        "model": "firewalld",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "firewalld",
        "version": "0.4.3"
      },
      {
        "model": "firewalld",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "firewalld",
        "version": "0.4"
      },
      {
        "model": "firewalld",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "firewalld",
        "version": "0.3.13"
      },
      {
        "model": "firewalld",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "firewalld",
        "version": "0.3.12"
      },
      {
        "model": "firewalld",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "firewalld",
        "version": "0.4.3.1"
      },
      {
        "model": "firewalld",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "firewalld",
        "version": "0.4.1.1"
      },
      {
        "model": "firewalld",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "firewalld",
        "version": "0.4.3.3"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "92481"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-008467"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-5410"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201608-308"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:firewalld:firewalld:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "0.4.3.2",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2016-5410"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Huzaifa Sidhpurwala.",
    "sources": [
      {
        "db": "BID",
        "id": "92481"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201608-308"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2016-5410",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.9,
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "LOW",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Local",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 2.1,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2016-5410",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Low",
            "trust": 0.9,
            "userInteractionRequired": null,
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.9,
            "id": "VHN-94229",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "LOW",
            "trust": 0.1,
            "vectorString": "AV:L/AC:L/AU:N/C:N/I:P/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 1.8,
            "impactScore": 3.6,
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.0"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 5.5,
            "baseSeverity": "Medium",
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2016-5410",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "Low",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2016-5410",
            "trust": 1.8,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201608-308",
            "trust": 0.6,
            "value": "LOW"
          },
          {
            "author": "VULHUB",
            "id": "VHN-94229",
            "trust": 0.1,
            "value": "LOW"
          },
          {
            "author": "VULMON",
            "id": "CVE-2016-5410",
            "trust": 0.1,
            "value": "LOW"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-94229"
      },
      {
        "db": "VULMON",
        "id": "CVE-2016-5410"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-008467"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-5410"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201608-308"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "firewalld.py in firewalld before 0.4.3.3 allows local users to bypass authentication and modify firewall configurations via the (1) addPassthrough, (2) removePassthrough, (3) addEntry, (4) removeEntry, or (5) setEntries D-Bus API method. FirewallD is prone to a security-bypass vulnerability. \nAttackers can exploit this issue to bypass certain security restrictions to perform unauthorized  actions. This may aid in further attacks. \n-----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n                   Red Hat Security Advisory\n\nSynopsis:          Moderate: firewalld security, bug fix, and enhancement update\nAdvisory ID:       RHSA-2016:2597-02\nProduct:           Red Hat Enterprise Linux\nAdvisory URL:      https://rhn.redhat.com/errata/RHSA-2016-2597.html\nIssue date:        2016-11-03\nCVE Names:         CVE-2016-5410 \n=====================================================================\n\n1. Summary:\n\nAn update for firewalld is now available for Red Hat Enterprise Linux 7. \n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Client (v. 7) - noarch\nRed Hat Enterprise Linux Client Optional (v. 7) - noarch\nRed Hat Enterprise Linux ComputeNode (v. 7) - noarch\nRed Hat Enterprise Linux ComputeNode Optional (v. 7) - noarch\nRed Hat Enterprise Linux Server (v. 7) - noarch\nRed Hat Enterprise Linux Server Optional (v. 7) - noarch\nRed Hat Enterprise Linux Workstation (v. 7) - noarch\nRed Hat Enterprise Linux Workstation Optional (v. 7) - noarch\n\n3. Description:\n\nfirewalld is a firewall service daemon that provides a dynamic customizable\nfirewall with a D-Bus interface. \n\nThe following packages have been upgraded to a newer upstream version:\nfirewalld (0.4.3.2). Any locally logged\nin user could use this flaw to tamper or change firewall settings. \n(CVE-2016-5410)\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat\nEnterprise Linux 7.3 Release Notes linked from the References section. \n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1066037 - firewall-config should allow unspecifying zone binding for interface\n1136801 - a rule added into IN_\u003czone\u003e_allow chain with \u0027permanent direct\u0027 interface doesn\u0027t exist after reload\n1147500 - RFE: add command to firewall-cmd showing details of a service\n1147951 - firewall-cmd should support a default logging option. \n1219717 - Add radius TCP to policy. \n1220196 - Firewalld missing policies for imap and smtps\n1220467 - Option \u0027--quiet\u0027 is needed in firewall-offline-cmd command line. \n1237242 - Error: RT_TO_PERM_FAILED: zone \u0027dmz\u0027 : ZONE_CONFLICT when doing --runtime-to-permanent\n1273296 - [ALL_LANG][firewalld] Translation incomplete\n1273888 - Firewalld DefaultZone change breaking on --reload\n1281416 - Headless firewall-config over ssh. firewall-config missing dependencies\n1285769 - Fails to start without ip6t_rpfilter module\n1292926 - firewalld --new-service \u0026 malformed xml ??\n1296573 - xsd specification nor service daemon checks whether tags are specified more than once if they must not\n1301573 - firewalld reporting errors in logs for failed iptables commands\n1302802 - Rebase to the new upstream and new release\n1303026 - firewalld - mistake in \u003cports\u003e renders ports remain closed, silently. \n1305434 - Firewalld hangs with a NIS configuration\n1313023 - command \"systemctl reload firewalld\" stops firewalld\n1313845 - Backport After=dbus.service\n1325335 - [RFE] allow negation of icmp-blocks zone configuration field\n1326130 - firewalld stops traffic from/to 127.0.0.1 when masquerading is enabled in default zone\n1326462 - rich rule with destination and no element give error\n1347530 - Add port for corosync-qnetd to high-availability service\n1349903 - FirewallD fails to parse direct rules with a lot of destination addresses\n1357050 - exit codes don\u0027t match error messages in firewall-cmd\n1360135 - CVE-2016-5410 firewalld: Firewall configuration can be modified by any logged in user\n1360894 - Print errors and warnings to stderr\n1365198 - firewall-cmd ipset --add-entries-from-file broken\n1367038 - firewall-cmd crashes if /run/dbus/system_bus_socket does not exist\n1368949 - Trying to get the description for a firewalld zone from command line throws error and prints traceback information. \n1371116 - Load helper modules in FirewallZoneTransaction\n1373260 - An error in the permanent direct rules will make all other direct rules using a table other than the filter table not applicable. \n1374799 - exclude firewallctl from firewalld v0.4.3.2 update\n\n6. Package List:\n\nRed Hat Enterprise Linux Client (v. 7):\n\nSource:\nfirewalld-0.4.3.2-8.el7.src.rpm\n\nnoarch:\nfirewall-config-0.4.3.2-8.el7.noarch.rpm\nfirewalld-0.4.3.2-8.el7.noarch.rpm\nfirewalld-filesystem-0.4.3.2-8.el7.noarch.rpm\npython-firewall-0.4.3.2-8.el7.noarch.rpm\n\nRed Hat Enterprise Linux Client Optional (v. 7):\n\nnoarch:\nfirewall-applet-0.4.3.2-8.el7.noarch.rpm\n\nRed Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\nfirewalld-0.4.3.2-8.el7.src.rpm\n\nnoarch:\nfirewalld-0.4.3.2-8.el7.noarch.rpm\nfirewalld-filesystem-0.4.3.2-8.el7.noarch.rpm\npython-firewall-0.4.3.2-8.el7.noarch.rpm\n\nRed Hat Enterprise Linux ComputeNode Optional (v. 7):\n\nnoarch:\nfirewall-applet-0.4.3.2-8.el7.noarch.rpm\nfirewall-config-0.4.3.2-8.el7.noarch.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\nfirewalld-0.4.3.2-8.el7.src.rpm\n\nnoarch:\nfirewall-config-0.4.3.2-8.el7.noarch.rpm\nfirewalld-0.4.3.2-8.el7.noarch.rpm\nfirewalld-filesystem-0.4.3.2-8.el7.noarch.rpm\npython-firewall-0.4.3.2-8.el7.noarch.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 7):\n\nnoarch:\nfirewall-applet-0.4.3.2-8.el7.noarch.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nfirewalld-0.4.3.2-8.el7.src.rpm\n\nnoarch:\nfirewall-config-0.4.3.2-8.el7.noarch.rpm\nfirewalld-0.4.3.2-8.el7.noarch.rpm\nfirewalld-filesystem-0.4.3.2-8.el7.noarch.rpm\npython-firewall-0.4.3.2-8.el7.noarch.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 7):\n\nnoarch:\nfirewall-applet-0.4.3.2-8.el7.noarch.rpm\n\nThese packages are GPG signed by Red Hat for security.  Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2016-5410\nhttps://access.redhat.com/security/updates/classification/#moderate\nhttps://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/7.3_Release_Notes/index.html\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2016 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niD8DBQFYGvz+XlSAg2UNWIIRAnYNAKC+tOJpkB9nwgqe+K/AaoZBzPX3RQCeM8De\nT81FpcV1vTa45DoiZC5wdUk=\n=+0pl\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. \n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory                           GLSA 201701-70\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n                                           https://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n    Title: Firewalld: Improper authentication methods\n     Date: January 29, 2017\n     Bugs: #591458\n       ID: 201701-70\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nA vulnerability in Firewalld allows firewall configurations to be\nmodified by unauthenticated users. \n\nBackground\n==========\n\nFirewalld provides a dynamically managed firewall with support for\nnetwork/firewall zones to define the trust level of network connections\nor interfaces.  This is due to how Firewalld handles\nauthentication via polkit which is not properly applied to 5 particular\nfunctions to include: addPassthrough, removePassthrough, addEntry,\nremoveEntry, and setEntries. \n\nImpact\n======\n\nA local attacker could tamper or change firewall settings leading to\nthe additional exposure of systems to include unauthorized remote\naccess. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Firewalld users should upgrade to the latest version:\n\n  # emerge --sync\n  # emerge --ask --oneshot --verbose \"\u003e=net-firewall/firewalld-0.4.3.3\"=\n\n\nReferences\n==========\n\n[ 1 ] CVE-2016-5410\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5410\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n https://security.gentoo.org/glsa/201701-70\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2017 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n\n\n--0Gjuansk3tW7pCmf5JAuWnfVtAeiNASDT--\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2016-5410"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-008467"
      },
      {
        "db": "BID",
        "id": "92481"
      },
      {
        "db": "VULHUB",
        "id": "VHN-94229"
      },
      {
        "db": "VULMON",
        "id": "CVE-2016-5410"
      },
      {
        "db": "PACKETSTORM",
        "id": "139525"
      },
      {
        "db": "PACKETSTORM",
        "id": "140775"
      }
    ],
    "trust": 2.25
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2016-5410",
        "trust": 3.1
      },
      {
        "db": "BID",
        "id": "92481",
        "trust": 2.1
      },
      {
        "db": "OPENWALL",
        "id": "OSS-SECURITY/2016/08/16/3",
        "trust": 1.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-008467",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201608-308",
        "trust": 0.7
      },
      {
        "db": "PACKETSTORM",
        "id": "140775",
        "trust": 0.2
      },
      {
        "db": "PACKETSTORM",
        "id": "139525",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-94229",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2016-5410",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-94229"
      },
      {
        "db": "VULMON",
        "id": "CVE-2016-5410"
      },
      {
        "db": "BID",
        "id": "92481"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-008467"
      },
      {
        "db": "PACKETSTORM",
        "id": "139525"
      },
      {
        "db": "PACKETSTORM",
        "id": "140775"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-5410"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201608-308"
      }
    ]
  },
  "id": "VAR-201704-0407",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-94229"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2023-12-18T13:03:08.535000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "firewalld 0.4.3.3 release",
        "trust": 0.8,
        "url": "http://www.firewalld.org/2016/08/firewalld-0-4-3-3-release"
      },
      {
        "title": "RHSA-2016:2597",
        "trust": 0.8,
        "url": "http://rhn.redhat.com/errata/rhsa-2016-2597.html"
      },
      {
        "title": "Bug 1360135",
        "trust": 0.8,
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1360135"
      },
      {
        "title": "FirewallD Repair measures for security bypass vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=63675"
      },
      {
        "title": "Red Hat: Moderate: firewalld security, bug fix, and enhancement update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20162597 - security advisory"
      },
      {
        "title": "Debian CVElist Bug Report Logs: firewalld: CVE-2016-5410: Firewall configuration can be modified by any logged in user",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=13e91998e11dcbf9abd7c967ac888414"
      },
      {
        "title": "Red Hat: CVE-2016-5410",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=cve-2016-5410"
      },
      {
        "title": "Oracle Linux Bulletins: Oracle Linux Bulletin - October 2016",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins\u0026qid=13f3551b67d913fba90df4b2c0dae0bf"
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2016-5410"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-008467"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201608-308"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-287",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-94229"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-008467"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-5410"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.9,
        "url": "http://www.securityfocus.com/bid/92481"
      },
      {
        "trust": 1.9,
        "url": "https://security.gentoo.org/glsa/201701-70"
      },
      {
        "trust": 1.9,
        "url": "http://rhn.redhat.com/errata/rhsa-2016-2597.html"
      },
      {
        "trust": 1.8,
        "url": "http://www.firewalld.org/2016/08/firewalld-0-4-3-3-release"
      },
      {
        "trust": 1.8,
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1360135"
      },
      {
        "trust": 1.8,
        "url": "http://www.openwall.com/lists/oss-security/2016/08/16/3"
      },
      {
        "trust": 1.0,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2016-5410"
      },
      {
        "trust": 1.0,
        "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/dpm3guqru2kprxdeqlamcdqeaiarjsbt/"
      },
      {
        "trust": 1.0,
        "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/zbjmylgrvkipjei3vzj4wqzt7fbq5bko/"
      },
      {
        "trust": 0.8,
        "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/zbjmylgrvkipjei3vzj4wqzt7fbq5bko/"
      },
      {
        "trust": 0.8,
        "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/dpm3guqru2kprxdeqlamcdqeaiarjsbt/"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-5410"
      },
      {
        "trust": 0.3,
        "url": "http://seclists.org/oss-sec/2016/q3/291"
      },
      {
        "trust": 0.3,
        "url": "https://github.com/t-woerner/firewalld"
      },
      {
        "trust": 0.3,
        "url": "http://www.firewalld.org/"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2016-5410"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/287.html"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2016:2597"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.3_release_notes/index.html"
      },
      {
        "trust": 0.1,
        "url": "https://bugzilla.redhat.com/):"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/team/key/"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/articles/11258"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/team/contact/"
      },
      {
        "trust": 0.1,
        "url": "http://creativecommons.org/licenses/by-sa/2.5"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5410"
      },
      {
        "trust": 0.1,
        "url": "https://security.gentoo.org/"
      },
      {
        "trust": 0.1,
        "url": "https://bugs.gentoo.org."
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-94229"
      },
      {
        "db": "VULMON",
        "id": "CVE-2016-5410"
      },
      {
        "db": "BID",
        "id": "92481"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-008467"
      },
      {
        "db": "PACKETSTORM",
        "id": "139525"
      },
      {
        "db": "PACKETSTORM",
        "id": "140775"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-5410"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201608-308"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-94229"
      },
      {
        "db": "VULMON",
        "id": "CVE-2016-5410"
      },
      {
        "db": "BID",
        "id": "92481"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-008467"
      },
      {
        "db": "PACKETSTORM",
        "id": "139525"
      },
      {
        "db": "PACKETSTORM",
        "id": "140775"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-5410"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201608-308"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-04-19T00:00:00",
        "db": "VULHUB",
        "id": "VHN-94229"
      },
      {
        "date": "2017-04-19T00:00:00",
        "db": "VULMON",
        "id": "CVE-2016-5410"
      },
      {
        "date": "2016-08-16T00:00:00",
        "db": "BID",
        "id": "92481"
      },
      {
        "date": "2017-05-19T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-008467"
      },
      {
        "date": "2016-11-04T20:08:25",
        "db": "PACKETSTORM",
        "id": "139525"
      },
      {
        "date": "2017-01-30T16:57:47",
        "db": "PACKETSTORM",
        "id": "140775"
      },
      {
        "date": "2017-04-19T14:59:00.207000",
        "db": "NVD",
        "id": "CVE-2016-5410"
      },
      {
        "date": "2016-08-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201608-308"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-04-25T00:00:00",
        "db": "VULHUB",
        "id": "VHN-94229"
      },
      {
        "date": "2017-04-25T00:00:00",
        "db": "VULMON",
        "id": "CVE-2016-5410"
      },
      {
        "date": "2017-02-02T06:03:00",
        "db": "BID",
        "id": "92481"
      },
      {
        "date": "2017-05-19T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-008467"
      },
      {
        "date": "2023-11-07T02:33:39.017000",
        "db": "NVD",
        "id": "CVE-2016-5410"
      },
      {
        "date": "2017-04-20T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201608-308"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201608-308"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "firewalld of  firewalld.py Vulnerabilities that bypass authentication",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-008467"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "authorization issue",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201608-308"
      }
    ],
    "trust": 0.6
  }
}