CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
26.7%
An authorization flaw was found in Pacemaker before 1.1.16, where it did not properly guard its IPC interface. An attacker with an unprivileged account on a Pacemaker node could use this flaw to, for example, force the Local Resource Manager daemon to execute a script as root and thereby gain root access on the machine.
[
{
"product": "pacemaker",
"vendor": "ClusterLabs",
"versions": [
{
"status": "affected",
"version": "1.1.16"
}
]
}
]
rhn.redhat.com/errata/RHSA-2016-2614.html
rhn.redhat.com/errata/RHSA-2016-2675.html
www.openwall.com/lists/oss-security/2016/11/03/5
www.securityfocus.com/bid/94214
bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7035
github.com/ClusterLabs/pacemaker/commit/5d71e65049
lists.clusterlabs.org/pipermail/users/2016-November/004432.html
security.gentoo.org/glsa/201710-08
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
26.7%