All the vulnerabilites related to firewalld - firewalld
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
firewalld | firewalld | * | |
redhat | enterprise_linux_desktop | 7.0 | |
redhat | enterprise_linux_hpc_node | 7.0 | |
redhat | enterprise_linux_server | 7.0 | |
redhat | enterprise_linux_workstation | 7.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:firewalld:firewalld:*:*:*:*:*:*:*:*", "matchCriteriaId": "848D161A-5C16-4653-8A44-320409D9101E", "versionEndIncluding": "0.4.3.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "3C84489B-B08C-4854-8A12-D01B6E45CF79", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "firewalld.py in firewalld before 0.4.3.3 allows local users to bypass authentication and modify firewall configurations via the (1) addPassthrough, (2) removePassthrough, (3) addEntry, (4) removeEntry, or (5) setEntries D-Bus API method." }, { "lang": "es", "value": "firewalld.py en firewalld en versiones anteriores a 0.4.3.3 permite a usuarios locales eludir la autenticaci\u00f3n y modificar las configuraciones del firewall a trav\u00e9s de (1) addPassthrough, (2) removePassthrough, (3) addEntry, (4) removeEntry o (5) setEntries D-Bus API method." } ], "id": "CVE-2016-5410", "lastModified": "2024-11-21T02:54:15.697", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-04-19T14:59:00.207", "references": [ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2597.html" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.firewalld.org/2016/08/firewalld-0-4-3-3-release" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List" ], "url": "http://www.openwall.com/lists/oss-security/2016/08/16/3" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/92481" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1360135" }, { "source": "secalert@redhat.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DPM3GUQRU2KPRXDEQLAMCDQEAIARJSBT/" }, { "source": "secalert@redhat.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZBJMYLGRVKIPJEI3VZJ4WQZT7FBQ5BKO/" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201701-70" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2597.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.firewalld.org/2016/08/firewalld-0-4-3-3-release" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://www.openwall.com/lists/oss-security/2016/08/16/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/92481" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1360135" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DPM3GUQRU2KPRXDEQLAMCDQEAIARJSBT/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZBJMYLGRVKIPJEI3VZJ4WQZT7FBQ5BKO/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201701-70" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2016-5410
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.firewalld.org/2016/08/firewalld-0-4-3-3-release | x_refsource_CONFIRM | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZBJMYLGRVKIPJEI3VZJ4WQZT7FBQ5BKO/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DPM3GUQRU2KPRXDEQLAMCDQEAIARJSBT/ | vendor-advisory, x_refsource_FEDORA | |
http://www.securityfocus.com/bid/92481 | vdb-entry, x_refsource_BID | |
https://bugzilla.redhat.com/show_bug.cgi?id=1360135 | x_refsource_CONFIRM | |
https://security.gentoo.org/glsa/201701-70 | vendor-advisory, x_refsource_GENTOO | |
http://rhn.redhat.com/errata/RHSA-2016-2597.html | vendor-advisory, x_refsource_REDHAT | |
http://www.openwall.com/lists/oss-security/2016/08/16/3 | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:01:00.114Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.firewalld.org/2016/08/firewalld-0-4-3-3-release" }, { "name": "FEDORA-2016-4dedc6ec3d", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZBJMYLGRVKIPJEI3VZJ4WQZT7FBQ5BKO/" }, { "name": "FEDORA-2016-de55d2c2c9", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DPM3GUQRU2KPRXDEQLAMCDQEAIARJSBT/" }, { "name": "92481", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/92481" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1360135" }, { "name": "GLSA-201701-70", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201701-70" }, { "name": "RHSA-2016:2597", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2597.html" }, { "name": "[oss-security] 20160816 firewalld: Firewall configuration can be modified by any logged in user", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2016/08/16/3" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-08-16T00:00:00", "descriptions": [ { "lang": "en", "value": "firewalld.py in firewalld before 0.4.3.3 allows local users to bypass authentication and modify firewall configurations via the (1) addPassthrough, (2) removePassthrough, (3) addEntry, (4) removeEntry, or (5) setEntries D-Bus API method." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-04-19T11:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.firewalld.org/2016/08/firewalld-0-4-3-3-release" }, { "name": "FEDORA-2016-4dedc6ec3d", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZBJMYLGRVKIPJEI3VZJ4WQZT7FBQ5BKO/" }, { "name": "FEDORA-2016-de55d2c2c9", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DPM3GUQRU2KPRXDEQLAMCDQEAIARJSBT/" }, { "name": "92481", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/92481" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1360135" }, { "name": "GLSA-201701-70", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201701-70" }, { "name": "RHSA-2016:2597", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2597.html" }, { "name": "[oss-security] 20160816 firewalld: Firewall configuration can be modified by any logged in user", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2016/08/16/3" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-5410", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "firewalld.py in firewalld before 0.4.3.3 allows local users to bypass authentication and modify firewall configurations via the (1) addPassthrough, (2) removePassthrough, (3) addEntry, (4) removeEntry, or (5) setEntries D-Bus API method." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.firewalld.org/2016/08/firewalld-0-4-3-3-release", "refsource": "CONFIRM", "url": "http://www.firewalld.org/2016/08/firewalld-0-4-3-3-release" }, { "name": "FEDORA-2016-4dedc6ec3d", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBJMYLGRVKIPJEI3VZJ4WQZT7FBQ5BKO/" }, { "name": "FEDORA-2016-de55d2c2c9", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DPM3GUQRU2KPRXDEQLAMCDQEAIARJSBT/" }, { "name": "92481", "refsource": "BID", "url": "http://www.securityfocus.com/bid/92481" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1360135", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1360135" }, { "name": "GLSA-201701-70", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201701-70" }, { "name": "RHSA-2016:2597", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-2597.html" }, { "name": "[oss-security] 20160816 firewalld: Firewall configuration can be modified by any logged in user", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2016/08/16/3" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-5410", "datePublished": "2017-04-19T14:00:00", "dateReserved": "2016-06-10T00:00:00", "dateUpdated": "2024-08-06T01:01:00.114Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
var-201704-0407
Vulnerability from variot
firewalld.py in firewalld before 0.4.3.3 allows local users to bypass authentication and modify firewall configurations via the (1) addPassthrough, (2) removePassthrough, (3) addEntry, (4) removeEntry, or (5) setEntries D-Bus API method. FirewallD is prone to a security-bypass vulnerability. Attackers can exploit this issue to bypass certain security restrictions to perform unauthorized actions. This may aid in further attacks. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Moderate: firewalld security, bug fix, and enhancement update Advisory ID: RHSA-2016:2597-02 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-2597.html Issue date: 2016-11-03 CVE Names: CVE-2016-5410 =====================================================================
- Summary:
An update for firewalld is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux Client (v. 7) - noarch Red Hat Enterprise Linux Client Optional (v. 7) - noarch Red Hat Enterprise Linux ComputeNode (v. 7) - noarch Red Hat Enterprise Linux ComputeNode Optional (v. 7) - noarch Red Hat Enterprise Linux Server (v. 7) - noarch Red Hat Enterprise Linux Server Optional (v. 7) - noarch Red Hat Enterprise Linux Workstation (v. 7) - noarch Red Hat Enterprise Linux Workstation Optional (v. 7) - noarch
- Description:
firewalld is a firewall service daemon that provides a dynamic customizable firewall with a D-Bus interface.
The following packages have been upgraded to a newer upstream version: firewalld (0.4.3.2). Any locally logged in user could use this flaw to tamper or change firewall settings. (CVE-2016-5410)
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.3 Release Notes linked from the References section.
- Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
- Bugs fixed (https://bugzilla.redhat.com/):
1066037 - firewall-config should allow unspecifying zone binding for interface
1136801 - a rule added into IN_
- Package List:
Red Hat Enterprise Linux Client (v. 7):
Source: firewalld-0.4.3.2-8.el7.src.rpm
noarch: firewall-config-0.4.3.2-8.el7.noarch.rpm firewalld-0.4.3.2-8.el7.noarch.rpm firewalld-filesystem-0.4.3.2-8.el7.noarch.rpm python-firewall-0.4.3.2-8.el7.noarch.rpm
Red Hat Enterprise Linux Client Optional (v. 7):
noarch: firewall-applet-0.4.3.2-8.el7.noarch.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source: firewalld-0.4.3.2-8.el7.src.rpm
noarch: firewalld-0.4.3.2-8.el7.noarch.rpm firewalld-filesystem-0.4.3.2-8.el7.noarch.rpm python-firewall-0.4.3.2-8.el7.noarch.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
noarch: firewall-applet-0.4.3.2-8.el7.noarch.rpm firewall-config-0.4.3.2-8.el7.noarch.rpm
Red Hat Enterprise Linux Server (v. 7):
Source: firewalld-0.4.3.2-8.el7.src.rpm
noarch: firewall-config-0.4.3.2-8.el7.noarch.rpm firewalld-0.4.3.2-8.el7.noarch.rpm firewalld-filesystem-0.4.3.2-8.el7.noarch.rpm python-firewall-0.4.3.2-8.el7.noarch.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
noarch: firewall-applet-0.4.3.2-8.el7.noarch.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source: firewalld-0.4.3.2-8.el7.src.rpm
noarch: firewall-config-0.4.3.2-8.el7.noarch.rpm firewalld-0.4.3.2-8.el7.noarch.rpm firewalld-filesystem-0.4.3.2-8.el7.noarch.rpm python-firewall-0.4.3.2-8.el7.noarch.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
noarch: firewall-applet-0.4.3.2-8.el7.noarch.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2016-5410 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/7.3_Release_Notes/index.html
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iD8DBQFYGvz+XlSAg2UNWIIRAnYNAKC+tOJpkB9nwgqe+K/AaoZBzPX3RQCeM8De T81FpcV1vTa45DoiZC5wdUk= =+0pl -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce .
Gentoo Linux Security Advisory GLSA 201701-70
https://security.gentoo.org/
Severity: Normal Title: Firewalld: Improper authentication methods Date: January 29, 2017 Bugs: #591458 ID: 201701-70
Synopsis
A vulnerability in Firewalld allows firewall configurations to be modified by unauthenticated users.
Background
Firewalld provides a dynamically managed firewall with support for network/firewall zones to define the trust level of network connections or interfaces. This is due to how Firewalld handles authentication via polkit which is not properly applied to 5 particular functions to include: addPassthrough, removePassthrough, addEntry, removeEntry, and setEntries.
Impact
A local attacker could tamper or change firewall settings leading to the additional exposure of systems to include unauthorized remote access.
Workaround
There is no known workaround at this time.
Resolution
All Firewalld users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-firewall/firewalld-0.4.3.3"=
References
[ 1 ] CVE-2016-5410 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5410
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
https://security.gentoo.org/glsa/201701-70
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2017 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
--0Gjuansk3tW7pCmf5JAuWnfVtAeiNASDT--
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201704-0407", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "enterprise linux server", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.0" }, { "model": "enterprise linux hpc node", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.0" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.0" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.0" }, { "model": "firewalld", "scope": "lte", "trust": 1.0, "vendor": "firewalld", "version": "0.4.3.2" }, { "model": "firewalld", "scope": "eq", "trust": 0.9, "vendor": "firewalld", "version": "0.4.3.2" }, { "model": "firewalld", "scope": "lt", "trust": 0.8, "vendor": "firewalld", "version": "0.4.3.3" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "7.0" }, { "model": "enterprise linux hpc node", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "7.0" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "7.0" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "7.0" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "firewalld", "scope": "eq", "trust": 0.3, "vendor": "firewalld", "version": "0.4.3" }, { "model": "firewalld", "scope": "eq", "trust": 0.3, "vendor": "firewalld", "version": "0.4" }, { "model": "firewalld", "scope": "eq", "trust": 0.3, "vendor": "firewalld", "version": "0.3.13" }, { "model": "firewalld", "scope": "eq", "trust": 0.3, "vendor": "firewalld", "version": "0.3.12" }, { "model": "firewalld", "scope": "eq", "trust": 0.3, "vendor": "firewalld", "version": "0.4.3.1" }, { "model": "firewalld", "scope": "eq", "trust": 0.3, "vendor": "firewalld", "version": "0.4.1.1" }, { "model": "firewalld", "scope": "ne", "trust": 0.3, "vendor": "firewalld", "version": "0.4.3.3" } ], "sources": [ { "db": "BID", "id": "92481" }, { "db": "JVNDB", "id": "JVNDB-2016-008467" }, { "db": "NVD", "id": "CVE-2016-5410" }, { "db": "CNNVD", "id": "CNNVD-201608-308" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:firewalld:firewalld:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "0.4.3.2", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2016-5410" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huzaifa Sidhpurwala.", "sources": [ { "db": "BID", "id": "92481" }, { "db": "CNNVD", "id": "CNNVD-201608-308" } ], "trust": 0.9 }, "cve": "CVE-2016-5410", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 2.1, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2016-5410", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-94229", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2016-5410", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2016-5410", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201608-308", "trust": 0.6, "value": "LOW" }, { "author": "VULHUB", "id": "VHN-94229", "trust": 0.1, "value": "LOW" }, { "author": "VULMON", "id": "CVE-2016-5410", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-94229" }, { "db": "VULMON", "id": "CVE-2016-5410" }, { "db": "JVNDB", "id": "JVNDB-2016-008467" }, { "db": "NVD", "id": "CVE-2016-5410" }, { "db": "CNNVD", "id": "CNNVD-201608-308" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "firewalld.py in firewalld before 0.4.3.3 allows local users to bypass authentication and modify firewall configurations via the (1) addPassthrough, (2) removePassthrough, (3) addEntry, (4) removeEntry, or (5) setEntries D-Bus API method. FirewallD is prone to a security-bypass vulnerability. \nAttackers can exploit this issue to bypass certain security restrictions to perform unauthorized actions. This may aid in further attacks. \n-----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Moderate: firewalld security, bug fix, and enhancement update\nAdvisory ID: RHSA-2016:2597-02\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://rhn.redhat.com/errata/RHSA-2016-2597.html\nIssue date: 2016-11-03\nCVE Names: CVE-2016-5410 \n=====================================================================\n\n1. Summary:\n\nAn update for firewalld is now available for Red Hat Enterprise Linux 7. \n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Client (v. 7) - noarch\nRed Hat Enterprise Linux Client Optional (v. 7) - noarch\nRed Hat Enterprise Linux ComputeNode (v. 7) - noarch\nRed Hat Enterprise Linux ComputeNode Optional (v. 7) - noarch\nRed Hat Enterprise Linux Server (v. 7) - noarch\nRed Hat Enterprise Linux Server Optional (v. 7) - noarch\nRed Hat Enterprise Linux Workstation (v. 7) - noarch\nRed Hat Enterprise Linux Workstation Optional (v. 7) - noarch\n\n3. Description:\n\nfirewalld is a firewall service daemon that provides a dynamic customizable\nfirewall with a D-Bus interface. \n\nThe following packages have been upgraded to a newer upstream version:\nfirewalld (0.4.3.2). Any locally logged\nin user could use this flaw to tamper or change firewall settings. \n(CVE-2016-5410)\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat\nEnterprise Linux 7.3 Release Notes linked from the References section. \n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1066037 - firewall-config should allow unspecifying zone binding for interface\n1136801 - a rule added into IN_\u003czone\u003e_allow chain with \u0027permanent direct\u0027 interface doesn\u0027t exist after reload\n1147500 - RFE: add command to firewall-cmd showing details of a service\n1147951 - firewall-cmd should support a default logging option. \n1219717 - Add radius TCP to policy. \n1220196 - Firewalld missing policies for imap and smtps\n1220467 - Option \u0027--quiet\u0027 is needed in firewall-offline-cmd command line. \n1237242 - Error: RT_TO_PERM_FAILED: zone \u0027dmz\u0027 : ZONE_CONFLICT when doing --runtime-to-permanent\n1273296 - [ALL_LANG][firewalld] Translation incomplete\n1273888 - Firewalld DefaultZone change breaking on --reload\n1281416 - Headless firewall-config over ssh. firewall-config missing dependencies\n1285769 - Fails to start without ip6t_rpfilter module\n1292926 - firewalld --new-service \u0026 malformed xml ??\n1296573 - xsd specification nor service daemon checks whether tags are specified more than once if they must not\n1301573 - firewalld reporting errors in logs for failed iptables commands\n1302802 - Rebase to the new upstream and new release\n1303026 - firewalld - mistake in \u003cports\u003e renders ports remain closed, silently. \n1305434 - Firewalld hangs with a NIS configuration\n1313023 - command \"systemctl reload firewalld\" stops firewalld\n1313845 - Backport After=dbus.service\n1325335 - [RFE] allow negation of icmp-blocks zone configuration field\n1326130 - firewalld stops traffic from/to 127.0.0.1 when masquerading is enabled in default zone\n1326462 - rich rule with destination and no element give error\n1347530 - Add port for corosync-qnetd to high-availability service\n1349903 - FirewallD fails to parse direct rules with a lot of destination addresses\n1357050 - exit codes don\u0027t match error messages in firewall-cmd\n1360135 - CVE-2016-5410 firewalld: Firewall configuration can be modified by any logged in user\n1360894 - Print errors and warnings to stderr\n1365198 - firewall-cmd ipset --add-entries-from-file broken\n1367038 - firewall-cmd crashes if /run/dbus/system_bus_socket does not exist\n1368949 - Trying to get the description for a firewalld zone from command line throws error and prints traceback information. \n1371116 - Load helper modules in FirewallZoneTransaction\n1373260 - An error in the permanent direct rules will make all other direct rules using a table other than the filter table not applicable. \n1374799 - exclude firewallctl from firewalld v0.4.3.2 update\n\n6. Package List:\n\nRed Hat Enterprise Linux Client (v. 7):\n\nSource:\nfirewalld-0.4.3.2-8.el7.src.rpm\n\nnoarch:\nfirewall-config-0.4.3.2-8.el7.noarch.rpm\nfirewalld-0.4.3.2-8.el7.noarch.rpm\nfirewalld-filesystem-0.4.3.2-8.el7.noarch.rpm\npython-firewall-0.4.3.2-8.el7.noarch.rpm\n\nRed Hat Enterprise Linux Client Optional (v. 7):\n\nnoarch:\nfirewall-applet-0.4.3.2-8.el7.noarch.rpm\n\nRed Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\nfirewalld-0.4.3.2-8.el7.src.rpm\n\nnoarch:\nfirewalld-0.4.3.2-8.el7.noarch.rpm\nfirewalld-filesystem-0.4.3.2-8.el7.noarch.rpm\npython-firewall-0.4.3.2-8.el7.noarch.rpm\n\nRed Hat Enterprise Linux ComputeNode Optional (v. 7):\n\nnoarch:\nfirewall-applet-0.4.3.2-8.el7.noarch.rpm\nfirewall-config-0.4.3.2-8.el7.noarch.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\nfirewalld-0.4.3.2-8.el7.src.rpm\n\nnoarch:\nfirewall-config-0.4.3.2-8.el7.noarch.rpm\nfirewalld-0.4.3.2-8.el7.noarch.rpm\nfirewalld-filesystem-0.4.3.2-8.el7.noarch.rpm\npython-firewall-0.4.3.2-8.el7.noarch.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 7):\n\nnoarch:\nfirewall-applet-0.4.3.2-8.el7.noarch.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nfirewalld-0.4.3.2-8.el7.src.rpm\n\nnoarch:\nfirewall-config-0.4.3.2-8.el7.noarch.rpm\nfirewalld-0.4.3.2-8.el7.noarch.rpm\nfirewalld-filesystem-0.4.3.2-8.el7.noarch.rpm\npython-firewall-0.4.3.2-8.el7.noarch.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 7):\n\nnoarch:\nfirewall-applet-0.4.3.2-8.el7.noarch.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2016-5410\nhttps://access.redhat.com/security/updates/classification/#moderate\nhttps://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/7.3_Release_Notes/index.html\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2016 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niD8DBQFYGvz+XlSAg2UNWIIRAnYNAKC+tOJpkB9nwgqe+K/AaoZBzPX3RQCeM8De\nT81FpcV1vTa45DoiZC5wdUk=\n=+0pl\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. \n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201701-70\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n https://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: Firewalld: Improper authentication methods\n Date: January 29, 2017\n Bugs: #591458\n ID: 201701-70\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nA vulnerability in Firewalld allows firewall configurations to be\nmodified by unauthenticated users. \n\nBackground\n==========\n\nFirewalld provides a dynamically managed firewall with support for\nnetwork/firewall zones to define the trust level of network connections\nor interfaces. This is due to how Firewalld handles\nauthentication via polkit which is not properly applied to 5 particular\nfunctions to include: addPassthrough, removePassthrough, addEntry,\nremoveEntry, and setEntries. \n\nImpact\n======\n\nA local attacker could tamper or change firewall settings leading to\nthe additional exposure of systems to include unauthorized remote\naccess. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Firewalld users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-firewall/firewalld-0.4.3.3\"=\n\n\nReferences\n==========\n\n[ 1 ] CVE-2016-5410\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5410\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n https://security.gentoo.org/glsa/201701-70\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2017 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n\n\n--0Gjuansk3tW7pCmf5JAuWnfVtAeiNASDT--\n\n", "sources": [ { "db": "NVD", "id": "CVE-2016-5410" }, { "db": "JVNDB", "id": "JVNDB-2016-008467" }, { "db": "BID", "id": "92481" }, { "db": "VULHUB", "id": "VHN-94229" }, { "db": "VULMON", "id": "CVE-2016-5410" }, { "db": "PACKETSTORM", "id": "139525" }, { "db": "PACKETSTORM", "id": "140775" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-5410", "trust": 3.1 }, { "db": "BID", "id": "92481", "trust": 2.1 }, { "db": "OPENWALL", "id": "OSS-SECURITY/2016/08/16/3", "trust": 1.8 }, { "db": "JVNDB", "id": "JVNDB-2016-008467", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201608-308", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "140775", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "139525", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-94229", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2016-5410", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-94229" }, { "db": "VULMON", "id": "CVE-2016-5410" }, { "db": "BID", "id": "92481" }, { "db": "JVNDB", "id": "JVNDB-2016-008467" }, { "db": "PACKETSTORM", "id": "139525" }, { "db": "PACKETSTORM", "id": "140775" }, { "db": "NVD", "id": "CVE-2016-5410" }, { "db": "CNNVD", "id": "CNNVD-201608-308" } ] }, "id": "VAR-201704-0407", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-94229" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:03:08.535000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "firewalld 0.4.3.3 release", "trust": 0.8, "url": "http://www.firewalld.org/2016/08/firewalld-0-4-3-3-release" }, { "title": "RHSA-2016:2597", "trust": 0.8, "url": "http://rhn.redhat.com/errata/rhsa-2016-2597.html" }, { "title": "Bug 1360135", "trust": 0.8, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1360135" }, { "title": "FirewallD Repair measures for security bypass vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=63675" }, { "title": "Red Hat: Moderate: firewalld security, bug fix, and enhancement update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20162597 - security advisory" }, { "title": "Debian CVElist Bug Report Logs: firewalld: CVE-2016-5410: Firewall configuration can be modified by any logged in user", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=13e91998e11dcbf9abd7c967ac888414" }, { "title": "Red Hat: CVE-2016-5410", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=cve-2016-5410" }, { "title": "Oracle Linux Bulletins: Oracle Linux Bulletin - October 2016", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins\u0026qid=13f3551b67d913fba90df4b2c0dae0bf" } ], "sources": [ { "db": "VULMON", "id": "CVE-2016-5410" }, { "db": "JVNDB", "id": "JVNDB-2016-008467" }, { "db": "CNNVD", "id": "CNNVD-201608-308" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-287", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-94229" }, { "db": "JVNDB", "id": "JVNDB-2016-008467" }, { "db": "NVD", "id": "CVE-2016-5410" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.9, "url": "http://www.securityfocus.com/bid/92481" }, { "trust": 1.9, "url": "https://security.gentoo.org/glsa/201701-70" }, { "trust": 1.9, "url": "http://rhn.redhat.com/errata/rhsa-2016-2597.html" }, { "trust": 1.8, "url": "http://www.firewalld.org/2016/08/firewalld-0-4-3-3-release" }, { "trust": 1.8, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1360135" }, { "trust": 1.8, "url": "http://www.openwall.com/lists/oss-security/2016/08/16/3" }, { "trust": 1.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-5410" }, { "trust": 1.0, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/dpm3guqru2kprxdeqlamcdqeaiarjsbt/" }, { "trust": 1.0, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/zbjmylgrvkipjei3vzj4wqzt7fbq5bko/" }, { "trust": 0.8, "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/zbjmylgrvkipjei3vzj4wqzt7fbq5bko/" }, { "trust": 0.8, "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/dpm3guqru2kprxdeqlamcdqeaiarjsbt/" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-5410" }, { "trust": 0.3, "url": "http://seclists.org/oss-sec/2016/q3/291" }, { "trust": 0.3, "url": "https://github.com/t-woerner/firewalld" }, { "trust": 0.3, "url": "http://www.firewalld.org/" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2016-5410" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/287.html" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2016:2597" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.1, "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.3_release_notes/index.html" }, { "trust": 0.1, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.1, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.1, "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5410" }, { "trust": 0.1, "url": "https://security.gentoo.org/" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." } ], "sources": [ { "db": "VULHUB", "id": "VHN-94229" }, { "db": "VULMON", "id": "CVE-2016-5410" }, { "db": "BID", "id": "92481" }, { "db": "JVNDB", "id": "JVNDB-2016-008467" }, { "db": "PACKETSTORM", "id": "139525" }, { "db": "PACKETSTORM", "id": "140775" }, { "db": "NVD", "id": "CVE-2016-5410" }, { "db": "CNNVD", "id": "CNNVD-201608-308" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-94229" }, { "db": "VULMON", "id": "CVE-2016-5410" }, { "db": "BID", "id": "92481" }, { "db": "JVNDB", "id": "JVNDB-2016-008467" }, { "db": "PACKETSTORM", "id": "139525" }, { "db": "PACKETSTORM", "id": "140775" }, { "db": "NVD", "id": "CVE-2016-5410" }, { "db": "CNNVD", "id": "CNNVD-201608-308" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-04-19T00:00:00", "db": "VULHUB", "id": "VHN-94229" }, { "date": "2017-04-19T00:00:00", "db": "VULMON", "id": "CVE-2016-5410" }, { "date": "2016-08-16T00:00:00", "db": "BID", "id": "92481" }, { "date": "2017-05-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-008467" }, { "date": "2016-11-04T20:08:25", "db": "PACKETSTORM", "id": "139525" }, { "date": "2017-01-30T16:57:47", "db": "PACKETSTORM", "id": "140775" }, { "date": "2017-04-19T14:59:00.207000", "db": "NVD", "id": "CVE-2016-5410" }, { "date": "2016-08-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201608-308" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-04-25T00:00:00", "db": "VULHUB", "id": "VHN-94229" }, { "date": "2017-04-25T00:00:00", "db": "VULMON", "id": "CVE-2016-5410" }, { "date": "2017-02-02T06:03:00", "db": "BID", "id": "92481" }, { "date": "2017-05-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-008467" }, { "date": "2023-11-07T02:33:39.017000", "db": "NVD", "id": "CVE-2016-5410" }, { "date": "2017-04-20T00:00:00", "db": "CNNVD", "id": "CNNVD-201608-308" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201608-308" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "firewalld of firewalld.py Vulnerabilities that bypass authentication", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-008467" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-201608-308" } ], "trust": 0.6 } }