firewalld: authentication bypass
Package(s): | firewalld |
CVE #(s): | CVE-2016-5410
|
Created: | August 22, 2016 |
Updated: | January 30, 2017 |
Description: |
From the Red Hat bugzilla entry:
FirewallD provides dbus api for modification of configuration after user has been authenticated via polkit. This does not apply for 5 methods which can be called by any logged user using dbus api or firewall-cmd cli interface. Any predefined policy can be used, server or desktop.
list of concerned dbus methods in firewalld.py:
addPassthrough,
removePassthrough,
addEntry,
removeEntry, and
setEntries.
Any locally logged in user, could use the above firewalld commands to tamper or change the firewall settings. |
Alerts: |
|