Vulnerability Details : CVE-2016-7035
An authorization flaw was found in Pacemaker before 1.1.16, where it did not properly guard its IPC interface. An attacker with an unprivileged account on a Pacemaker node could use this flaw to, for example, force the Local Resource Manager daemon to execute a script as root and thereby gain root access on the machine.
Vulnerability category: BypassGain privilege
Exploit prediction scoring system (EPSS) score for CVE-2016-7035
Probability of exploitation activity in the next 30 days: 0.06%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 25 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2016-7035
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST |
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
Red Hat, Inc. |
7.8
|
HIGH | CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
8.8
|
HIGH | CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
2.0
|
6.0
|
Red Hat, Inc. |
CWE ids for CVE-2016-7035
-
The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.Assigned by:
- nvd@nist.gov (Primary)
- secalert@redhat.com (Secondary)
References for CVE-2016-7035
-
https://lists.clusterlabs.org/pipermail/users/2016-November/004432.html
[ClusterLabs] [SECURITY] CVE-2016-7035 - pacemaker - improper IPC guardingMailing List;Vendor Advisory
-
https://github.com/ClusterLabs/pacemaker/commit/5d71e65049
High: libcrmcommon: fix CVE-2016-7035 (improper IPC guarding) · ClusterLabs/pacemaker@5d71e65 · GitHubThird Party Advisory
-
https://security.gentoo.org/glsa/201710-08
Pacemaker: Multiple vulnerabilities (GLSA 201710-08) — Gentoo securityThird Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7035
1369732 – (CVE-2016-7035) CVE-2016-7035 pacemaker: Privilege escalation due to improper guarding of IPC communicationIssue Tracking;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2016/11/03/5
oss-security - CVE-2016-7035 - pacemaker - improper IPC guardingMailing List;Third Party Advisory
-
http://www.securityfocus.com/bid/94214
Pacemaker CVE-2016-7035 Local Privilege Escalation VulnerabilityThird Party Advisory;VDB Entry
-
http://rhn.redhat.com/errata/RHSA-2016-2614.html
RHSA-2016:2614 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2016-2675.html
RHSA-2016:2675 - Security Advisory - Red Hat Customer PortalThird Party Advisory
Products affected by CVE-2016-7035
- cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
- cpe:2.3:a:clusterlabs:pacemaker:*:*:*:*:*:*:*:*