rhsa-2016_2839
Vulnerability from csaf_redhat
Published
2016-11-30 19:51
Modified
2024-11-22 10:27
Summary
Red Hat Security Advisory: CFME 5.6.3 security, bug fix, and enhancement update
Notes
Topic
An update is now available for Red Hat CloudForms 4.1.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller (MVC) framework for web application development. Action Pack implements the controller and the view components.
Security Fix(es):
* A code injection flaw was found in the way capacity and utilization imported control files are processed. A remote, authenticated attacker with access to the capacity and utilization feature could use this flaw to execute arbitrary code as the user CFME runs as. (CVE-2016-5402)
This issue was discovered by Simon Lukasik (Red Hat).
Additional Changes:
This update also fixes various bugs and adds several enhancements. Notable changes include:
Changes to the Automate component:
* This release of CloudForms allows provisioning of a virtual machine without specifying a host but validating a cluster. CloudForms now validates if either a host or cluster is selected when provisioning on VMware. (BZ#1378116)
Changes to the Providers component:
* In the previous version of CloudForms, when attempting to open a VNC console to an instance, CloudForms failed to connect because the instance did not exist for that tenant - it attempted to use the wrong tenant. This update specifies the tenant when opening a VNC console which has resolved the issue. CloudForms is now able to connect successfully without an error. (BZ#1370207)
Changes to the Provisioning component:
* In the previous version of CloudForms, cloning a VMware template failed when the target datacenter was nested below multiple folders. This was because if the datacenter was nested logically under various folders, users were unable to find the placement ID during an autoplacement VMware provision request. This fix always does a lookup of the folder path from the host datacenter instead of statically setting a possible wrong default value which has resolved the issue. (BZ#1361174)
Changes to the Replication component:
* In the previous version of CloudForms, subscription validation failed for replication subscriptions which were successfully saved. This was because the validation was done directly by the UI which did not have access to passwords of currently saved subscriptions. The validation would pass when the user enters the password when initially saving the subscription, but failed once the subscription needed to be retrieved from the database. This update has fixed the failing validation on saved replication subscriptions. (BZ#1378554)
Changes to the vulnerability component:
* A code injection flaw was found in the way capacity and utilization imported control files are processed. A remote, authenticated attacker with access to the capacity and utilization feature could use this flaw to execute arbitrary code as the user CFME runs as. (BZ#1357559)
* In the previous version of CloudForms, when trying to save filters in Subnets/Routers/Security groups/Floating IPs/Network ports exception appeared. This was caused due to missing routes for network resources. This update adds missing routes for network resources and the issue has now been resolved. (BZ#1370573)
* In the previous version of CloudForms, My Filters in datastore was unclickable and no filters were shown under it. This update enabled My Filters in datastore and the issue is now resolved. (BZ#1379727)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat CloudForms 4.1.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller (MVC) framework for web application development. Action Pack implements the controller and the view components.\n\nSecurity Fix(es):\n\n* A code injection flaw was found in the way capacity and utilization imported control files are processed. A remote, authenticated attacker with access to the capacity and utilization feature could use this flaw to execute arbitrary code as the user CFME runs as. (CVE-2016-5402)\n\nThis issue was discovered by Simon Lukasik (Red Hat).\n\nAdditional Changes:\n\nThis update also fixes various bugs and adds several enhancements. Notable changes include:\n\nChanges to the Automate component:\n\n* This release of CloudForms allows provisioning of a virtual machine without specifying a host but validating a cluster. CloudForms now validates if either a host or cluster is selected when provisioning on VMware. (BZ#1378116)\n\nChanges to the Providers component:\n\n* In the previous version of CloudForms, when attempting to open a VNC console to an instance, CloudForms failed to connect because the instance did not exist for that tenant - it attempted to use the wrong tenant. This update specifies the tenant when opening a VNC console which has resolved the issue. CloudForms is now able to connect successfully without an error. (BZ#1370207)\n\nChanges to the Provisioning component:\n\n* In the previous version of CloudForms, cloning a VMware template failed when the target datacenter was nested below multiple folders. This was because if the datacenter was nested logically under various folders, users were unable to find the placement ID during an autoplacement VMware provision request. This fix always does a lookup of the folder path from the host datacenter instead of statically setting a possible wrong default value which has resolved the issue. (BZ#1361174)\n\nChanges to the Replication component:\n\n* In the previous version of CloudForms, subscription validation failed for replication subscriptions which were successfully saved. This was because the validation was done directly by the UI which did not have access to passwords of currently saved subscriptions. The validation would pass when the user enters the password when initially saving the subscription, but failed once the subscription needed to be retrieved from the database. This update has fixed the failing validation on saved replication subscriptions. (BZ#1378554)\n\nChanges to the vulnerability component:\n\n* A code injection flaw was found in the way capacity and utilization imported control files are processed. A remote, authenticated attacker with access to the capacity and utilization feature could use this flaw to execute arbitrary code as the user CFME runs as. (BZ#1357559)\n\n* In the previous version of CloudForms, when trying to save filters in Subnets/Routers/Security groups/Floating IPs/Network ports exception appeared. This was caused due to missing routes for network resources. This update adds missing routes for network resources and the issue has now been resolved. (BZ#1370573)\n\n* In the previous version of CloudForms, My Filters in datastore was unclickable and no filters were shown under it. This update enabled My Filters in datastore and the issue is now resolved. (BZ#1379727)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:2839", "url": "https://access.redhat.com/errata/RHSA-2016:2839" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1346967", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1346967" }, { "category": "external", "summary": "1346969", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1346969" }, { "category": "external", "summary": "1347002", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1347002" }, { "category": "external", "summary": "1349413", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1349413" }, { "category": "external", "summary": "1357559", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1357559" }, { "category": "external", "summary": "1358324", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358324" }, { "category": "external", "summary": "1361174", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361174" }, { "category": "external", "summary": "1362632", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1362632" }, { "category": "external", "summary": "1368162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1368162" }, { "category": "external", "summary": "1368172", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1368172" }, { "category": "external", "summary": "1370207", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1370207" }, { "category": "external", "summary": "1370570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1370570" }, { "category": "external", "summary": "1370573", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1370573" }, { "category": "external", "summary": "1370576", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1370576" }, { "category": "external", "summary": "1372768", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1372768" }, { "category": "external", "summary": "1375206", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375206" }, { "category": "external", "summary": "1376145", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376145" }, { "category": "external", "summary": "1376514", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376514" }, { "category": "external", "summary": "1376516", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376516" }, { "category": "external", "summary": "1376519", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376519" }, { "category": "external", "summary": "1376521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376521" }, { "category": "external", "summary": "1376525", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376525" }, { "category": "external", "summary": "1376526", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376526" }, { "category": "external", "summary": "1377417", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1377417" }, { "category": "external", "summary": "1377418", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1377418" }, { "category": "external", "summary": "1378116", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1378116" }, { "category": "external", "summary": "1378173", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1378173" }, { "category": "external", "summary": "1378554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1378554" }, { "category": "external", "summary": "1379692", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1379692" }, { "category": "external", "summary": "1379693", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1379693" }, { "category": "external", "summary": "1379694", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1379694" }, { "category": "external", "summary": "1379697", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1379697" }, { "category": "external", "summary": "1379727", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1379727" }, { "category": "external", "summary": "1379728", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1379728" }, { "category": "external", "summary": "1380107", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1380107" }, { "category": "external", "summary": "1380170", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1380170" }, { "category": "external", "summary": "1381624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381624" }, { "category": "external", "summary": "1382072", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382072" }, { "category": "external", "summary": "1382074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382074" }, { "category": "external", "summary": "1382164", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382164" }, { "category": "external", "summary": "1382406", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382406" }, { "category": "external", "summary": "1382408", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382408" }, { "category": "external", "summary": "1382753", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382753" }, { "category": "external", "summary": "1382819", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382819" }, { "category": "external", "summary": "1382826", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382826" }, { "category": "external", "summary": "1382834", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382834" }, { "category": "external", "summary": "1382835", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382835" }, { "category": "external", "summary": "1382836", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382836" }, { "category": "external", "summary": "1382837", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382837" }, { "category": "external", "summary": "1382846", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382846" }, { "category": "external", "summary": "1382847", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382847" }, { "category": "external", "summary": "1383368", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1383368" }, { "category": "external", "summary": "1383466", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1383466" }, { "category": "external", "summary": "1383469", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1383469" }, { "category": "external", "summary": "1383470", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1383470" }, { "category": "external", "summary": "1383497", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1383497" }, { "category": "external", "summary": "1385156", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1385156" }, { "category": "external", "summary": "1385173", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1385173" }, { "category": "external", "summary": "1386792", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386792" }, { "category": "external", "summary": "1386793", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386793" }, { "category": "external", "summary": "1386794", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386794" }, { "category": "external", "summary": "1386797", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386797" }, { "category": "external", "summary": "1388984", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388984" }, { "category": "external", "summary": "1389025", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1389025" }, { "category": "external", "summary": "1389760", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1389760" }, { "category": "external", "summary": "1389790", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1389790" }, { "category": "external", "summary": "1390697", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1390697" }, { "category": "external", "summary": "1390698", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1390698" }, { "category": "external", "summary": "1390724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1390724" }, { "category": "external", "summary": "1391710", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1391710" }, { "category": "external", "summary": "1391721", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1391721" }, { "category": "external", "summary": "1391764", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1391764" }, { "category": "external", "summary": "1391980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1391980" }, { "category": "external", "summary": "1392561", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1392561" }, { "category": "external", "summary": "1392964", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1392964" }, { "category": "external", "summary": "1393061", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1393061" }, { "category": "external", "summary": "1395305", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1395305" }, { "category": "external", "summary": "1396665", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1396665" }, { "category": "external", "summary": "1397093", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397093" }, { "category": "external", "summary": "1397095", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397095" }, { "category": "external", "summary": "1397516", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397516" }, { "category": "external", "summary": "1399285", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1399285" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_2839.json" } ], "title": "Red Hat Security Advisory: CFME 5.6.3 security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-22T10:27:35+00:00", "generator": { "date": "2024-11-22T10:27:35+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2016:2839", "initial_release_date": "2016-11-30T19:51:49+00:00", "revision_history": [ { "date": "2016-11-30T19:51:49+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-11-30T19:51:49+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T10:27:35+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "CloudForms Management Engine 5.6", "product": { "name": "CloudForms Management Engine 5.6", "product_id": "7Server-RH7-CFME-5.6", "product_identification_helper": { "cpe": "cpe:/a:redhat:cloudforms_managementengine:5.6::el7" } } } ], "category": "product_family", "name": "Red Hat CloudForms" }, { "branches": [ { "category": "product_version", "name": "freeipmi-bmc-watchdog-0:1.5.1-2.el7cf.x86_64", "product": { "name": "freeipmi-bmc-watchdog-0:1.5.1-2.el7cf.x86_64", "product_id": "freeipmi-bmc-watchdog-0:1.5.1-2.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeipmi-bmc-watchdog@1.5.1-2.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "freeipmi-ipmidetectd-0:1.5.1-2.el7cf.x86_64", "product": { "name": "freeipmi-ipmidetectd-0:1.5.1-2.el7cf.x86_64", "product_id": "freeipmi-ipmidetectd-0:1.5.1-2.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeipmi-ipmidetectd@1.5.1-2.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "freeipmi-devel-0:1.5.1-2.el7cf.x86_64", "product": { "name": "freeipmi-devel-0:1.5.1-2.el7cf.x86_64", "product_id": "freeipmi-devel-0:1.5.1-2.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeipmi-devel@1.5.1-2.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "freeipmi-ipmiseld-0:1.5.1-2.el7cf.x86_64", "product": { "name": "freeipmi-ipmiseld-0:1.5.1-2.el7cf.x86_64", "product_id": "freeipmi-ipmiseld-0:1.5.1-2.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeipmi-ipmiseld@1.5.1-2.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "freeipmi-debuginfo-0:1.5.1-2.el7cf.x86_64", "product": { "name": "freeipmi-debuginfo-0:1.5.1-2.el7cf.x86_64", "product_id": "freeipmi-debuginfo-0:1.5.1-2.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeipmi-debuginfo@1.5.1-2.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "freeipmi-0:1.5.1-2.el7cf.x86_64", "product": { "name": "freeipmi-0:1.5.1-2.el7cf.x86_64", "product_id": "freeipmi-0:1.5.1-2.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeipmi@1.5.1-2.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "cfme-0:5.6.3.3-1.el7cf.x86_64", "product": { "name": "cfme-0:5.6.3.3-1.el7cf.x86_64", "product_id": "cfme-0:5.6.3.3-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme@5.6.3.3-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "cfme-debuginfo-0:5.6.3.3-1.el7cf.x86_64", "product": { "name": "cfme-debuginfo-0:5.6.3.3-1.el7cf.x86_64", "product_id": "cfme-debuginfo-0:5.6.3.3-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-debuginfo@5.6.3.3-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "cfme-gemset-0:5.6.3.3-1.el7cf.x86_64", "product": { "name": "cfme-gemset-0:5.6.3.3-1.el7cf.x86_64", "product_id": "cfme-gemset-0:5.6.3.3-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-gemset@5.6.3.3-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "cfme-appliance-0:5.6.3.3-1.el7cf.x86_64", "product": { "name": "cfme-appliance-0:5.6.3.3-1.el7cf.x86_64", "product_id": "cfme-appliance-0:5.6.3.3-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-appliance@5.6.3.3-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "cfme-appliance-debuginfo-0:5.6.3.3-1.el7cf.x86_64", "product": { "name": "cfme-appliance-debuginfo-0:5.6.3.3-1.el7cf.x86_64", "product_id": "cfme-appliance-debuginfo-0:5.6.3.3-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-appliance-debuginfo@5.6.3.3-1.el7cf?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "freeipmi-0:1.5.1-2.el7cf.src", "product": { "name": "freeipmi-0:1.5.1-2.el7cf.src", "product_id": "freeipmi-0:1.5.1-2.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeipmi@1.5.1-2.el7cf?arch=src" } } }, { "category": "product_version", "name": "cfme-0:5.6.3.3-1.el7cf.src", "product": { "name": "cfme-0:5.6.3.3-1.el7cf.src", "product_id": "cfme-0:5.6.3.3-1.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme@5.6.3.3-1.el7cf?arch=src" } } }, { "category": "product_version", "name": "cfme-gemset-0:5.6.3.3-1.el7cf.src", "product": { "name": "cfme-gemset-0:5.6.3.3-1.el7cf.src", "product_id": "cfme-gemset-0:5.6.3.3-1.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-gemset@5.6.3.3-1.el7cf?arch=src" } } }, { "category": "product_version", "name": "cfme-appliance-0:5.6.3.3-1.el7cf.src", "product": { "name": "cfme-appliance-0:5.6.3.3-1.el7cf.src", "product_id": "cfme-appliance-0:5.6.3.3-1.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-appliance@5.6.3.3-1.el7cf?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cfme-0:5.6.3.3-1.el7cf.src as a component of CloudForms Management Engine 5.6", "product_id": "7Server-RH7-CFME-5.6:cfme-0:5.6.3.3-1.el7cf.src" }, "product_reference": "cfme-0:5.6.3.3-1.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-0:5.6.3.3-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.6", "product_id": "7Server-RH7-CFME-5.6:cfme-0:5.6.3.3-1.el7cf.x86_64" }, "product_reference": "cfme-0:5.6.3.3-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-appliance-0:5.6.3.3-1.el7cf.src as a component of CloudForms Management Engine 5.6", "product_id": "7Server-RH7-CFME-5.6:cfme-appliance-0:5.6.3.3-1.el7cf.src" }, "product_reference": "cfme-appliance-0:5.6.3.3-1.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-appliance-0:5.6.3.3-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.6", "product_id": "7Server-RH7-CFME-5.6:cfme-appliance-0:5.6.3.3-1.el7cf.x86_64" }, "product_reference": "cfme-appliance-0:5.6.3.3-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-appliance-debuginfo-0:5.6.3.3-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.6", "product_id": "7Server-RH7-CFME-5.6:cfme-appliance-debuginfo-0:5.6.3.3-1.el7cf.x86_64" }, "product_reference": "cfme-appliance-debuginfo-0:5.6.3.3-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-debuginfo-0:5.6.3.3-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.6", "product_id": "7Server-RH7-CFME-5.6:cfme-debuginfo-0:5.6.3.3-1.el7cf.x86_64" }, "product_reference": "cfme-debuginfo-0:5.6.3.3-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-gemset-0:5.6.3.3-1.el7cf.src as a component of CloudForms Management Engine 5.6", "product_id": "7Server-RH7-CFME-5.6:cfme-gemset-0:5.6.3.3-1.el7cf.src" }, "product_reference": "cfme-gemset-0:5.6.3.3-1.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-gemset-0:5.6.3.3-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.6", "product_id": "7Server-RH7-CFME-5.6:cfme-gemset-0:5.6.3.3-1.el7cf.x86_64" }, "product_reference": "cfme-gemset-0:5.6.3.3-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "freeipmi-0:1.5.1-2.el7cf.src as a component of CloudForms Management Engine 5.6", "product_id": "7Server-RH7-CFME-5.6:freeipmi-0:1.5.1-2.el7cf.src" }, "product_reference": "freeipmi-0:1.5.1-2.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "freeipmi-0:1.5.1-2.el7cf.x86_64 as a component of CloudForms Management Engine 5.6", "product_id": "7Server-RH7-CFME-5.6:freeipmi-0:1.5.1-2.el7cf.x86_64" }, "product_reference": "freeipmi-0:1.5.1-2.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "freeipmi-bmc-watchdog-0:1.5.1-2.el7cf.x86_64 as a component of CloudForms Management Engine 5.6", "product_id": "7Server-RH7-CFME-5.6:freeipmi-bmc-watchdog-0:1.5.1-2.el7cf.x86_64" }, "product_reference": "freeipmi-bmc-watchdog-0:1.5.1-2.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "freeipmi-debuginfo-0:1.5.1-2.el7cf.x86_64 as a component of CloudForms Management Engine 5.6", "product_id": "7Server-RH7-CFME-5.6:freeipmi-debuginfo-0:1.5.1-2.el7cf.x86_64" }, "product_reference": "freeipmi-debuginfo-0:1.5.1-2.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "freeipmi-devel-0:1.5.1-2.el7cf.x86_64 as a component of CloudForms Management Engine 5.6", "product_id": "7Server-RH7-CFME-5.6:freeipmi-devel-0:1.5.1-2.el7cf.x86_64" }, "product_reference": "freeipmi-devel-0:1.5.1-2.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "freeipmi-ipmidetectd-0:1.5.1-2.el7cf.x86_64 as a component of CloudForms Management Engine 5.6", "product_id": "7Server-RH7-CFME-5.6:freeipmi-ipmidetectd-0:1.5.1-2.el7cf.x86_64" }, "product_reference": "freeipmi-ipmidetectd-0:1.5.1-2.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "freeipmi-ipmiseld-0:1.5.1-2.el7cf.x86_64 as a component of CloudForms Management Engine 5.6", "product_id": "7Server-RH7-CFME-5.6:freeipmi-ipmiseld-0:1.5.1-2.el7cf.x86_64" }, "product_reference": "freeipmi-ipmiseld-0:1.5.1-2.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.6" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Simon Lukasik" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2016-5402", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2016-07-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1357559" } ], "notes": [ { "category": "description", "text": "A code injection flaw was found in the way capacity and utilization imported control files are processed. A remote, authenticated attacker with access to the capacity and utilization feature could use this flaw to execute arbitrary code as the user CFME runs as.", "title": "Vulnerability description" }, { "category": "summary", "text": "cfme: RCE via Capacity \u0026 Utilization feature", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-CFME-5.6:cfme-0:5.6.3.3-1.el7cf.src", "7Server-RH7-CFME-5.6:cfme-0:5.6.3.3-1.el7cf.x86_64", "7Server-RH7-CFME-5.6:cfme-appliance-0:5.6.3.3-1.el7cf.src", "7Server-RH7-CFME-5.6:cfme-appliance-0:5.6.3.3-1.el7cf.x86_64", "7Server-RH7-CFME-5.6:cfme-appliance-debuginfo-0:5.6.3.3-1.el7cf.x86_64", "7Server-RH7-CFME-5.6:cfme-debuginfo-0:5.6.3.3-1.el7cf.x86_64", "7Server-RH7-CFME-5.6:cfme-gemset-0:5.6.3.3-1.el7cf.src", "7Server-RH7-CFME-5.6:cfme-gemset-0:5.6.3.3-1.el7cf.x86_64", "7Server-RH7-CFME-5.6:freeipmi-0:1.5.1-2.el7cf.src", "7Server-RH7-CFME-5.6:freeipmi-0:1.5.1-2.el7cf.x86_64", "7Server-RH7-CFME-5.6:freeipmi-bmc-watchdog-0:1.5.1-2.el7cf.x86_64", "7Server-RH7-CFME-5.6:freeipmi-debuginfo-0:1.5.1-2.el7cf.x86_64", "7Server-RH7-CFME-5.6:freeipmi-devel-0:1.5.1-2.el7cf.x86_64", "7Server-RH7-CFME-5.6:freeipmi-ipmidetectd-0:1.5.1-2.el7cf.x86_64", "7Server-RH7-CFME-5.6:freeipmi-ipmiseld-0:1.5.1-2.el7cf.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-5402" }, { "category": "external", "summary": "RHBZ#1357559", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1357559" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-5402", "url": "https://www.cve.org/CVERecord?id=CVE-2016-5402" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-5402", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5402" } ], "release_date": "2016-11-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-11-30T19:51:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-CFME-5.6:cfme-0:5.6.3.3-1.el7cf.src", "7Server-RH7-CFME-5.6:cfme-0:5.6.3.3-1.el7cf.x86_64", "7Server-RH7-CFME-5.6:cfme-appliance-0:5.6.3.3-1.el7cf.src", "7Server-RH7-CFME-5.6:cfme-appliance-0:5.6.3.3-1.el7cf.x86_64", "7Server-RH7-CFME-5.6:cfme-appliance-debuginfo-0:5.6.3.3-1.el7cf.x86_64", "7Server-RH7-CFME-5.6:cfme-debuginfo-0:5.6.3.3-1.el7cf.x86_64", "7Server-RH7-CFME-5.6:cfme-gemset-0:5.6.3.3-1.el7cf.src", "7Server-RH7-CFME-5.6:cfme-gemset-0:5.6.3.3-1.el7cf.x86_64", "7Server-RH7-CFME-5.6:freeipmi-0:1.5.1-2.el7cf.src", "7Server-RH7-CFME-5.6:freeipmi-0:1.5.1-2.el7cf.x86_64", "7Server-RH7-CFME-5.6:freeipmi-bmc-watchdog-0:1.5.1-2.el7cf.x86_64", "7Server-RH7-CFME-5.6:freeipmi-debuginfo-0:1.5.1-2.el7cf.x86_64", "7Server-RH7-CFME-5.6:freeipmi-devel-0:1.5.1-2.el7cf.x86_64", "7Server-RH7-CFME-5.6:freeipmi-ipmidetectd-0:1.5.1-2.el7cf.x86_64", "7Server-RH7-CFME-5.6:freeipmi-ipmiseld-0:1.5.1-2.el7cf.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2839" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 8.5, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-RH7-CFME-5.6:cfme-0:5.6.3.3-1.el7cf.src", "7Server-RH7-CFME-5.6:cfme-0:5.6.3.3-1.el7cf.x86_64", "7Server-RH7-CFME-5.6:cfme-appliance-0:5.6.3.3-1.el7cf.src", "7Server-RH7-CFME-5.6:cfme-appliance-0:5.6.3.3-1.el7cf.x86_64", "7Server-RH7-CFME-5.6:cfme-appliance-debuginfo-0:5.6.3.3-1.el7cf.x86_64", "7Server-RH7-CFME-5.6:cfme-debuginfo-0:5.6.3.3-1.el7cf.x86_64", "7Server-RH7-CFME-5.6:cfme-gemset-0:5.6.3.3-1.el7cf.src", "7Server-RH7-CFME-5.6:cfme-gemset-0:5.6.3.3-1.el7cf.x86_64", "7Server-RH7-CFME-5.6:freeipmi-0:1.5.1-2.el7cf.src", "7Server-RH7-CFME-5.6:freeipmi-0:1.5.1-2.el7cf.x86_64", "7Server-RH7-CFME-5.6:freeipmi-bmc-watchdog-0:1.5.1-2.el7cf.x86_64", "7Server-RH7-CFME-5.6:freeipmi-debuginfo-0:1.5.1-2.el7cf.x86_64", "7Server-RH7-CFME-5.6:freeipmi-devel-0:1.5.1-2.el7cf.x86_64", "7Server-RH7-CFME-5.6:freeipmi-ipmidetectd-0:1.5.1-2.el7cf.x86_64", "7Server-RH7-CFME-5.6:freeipmi-ipmiseld-0:1.5.1-2.el7cf.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cfme: RCE via Capacity \u0026 Utilization feature" } ] }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.