ID

VAR-201704-0407


CVE

CVE-2016-5410


TITLE

firewalld of firewalld.py Vulnerabilities that bypass authentication

Trust: 0.8

sources: JVNDB: JVNDB-2016-008467

DESCRIPTION

firewalld.py in firewalld before 0.4.3.3 allows local users to bypass authentication and modify firewall configurations via the (1) addPassthrough, (2) removePassthrough, (3) addEntry, (4) removeEntry, or (5) setEntries D-Bus API method. FirewallD is prone to a security-bypass vulnerability. Attackers can exploit this issue to bypass certain security restrictions to perform unauthorized actions. This may aid in further attacks. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: firewalld security, bug fix, and enhancement update Advisory ID: RHSA-2016:2597-02 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-2597.html Issue date: 2016-11-03 CVE Names: CVE-2016-5410 ===================================================================== 1. Summary: An update for firewalld is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - noarch Red Hat Enterprise Linux Client Optional (v. 7) - noarch Red Hat Enterprise Linux ComputeNode (v. 7) - noarch Red Hat Enterprise Linux ComputeNode Optional (v. 7) - noarch Red Hat Enterprise Linux Server (v. 7) - noarch Red Hat Enterprise Linux Server Optional (v. 7) - noarch Red Hat Enterprise Linux Workstation (v. 7) - noarch Red Hat Enterprise Linux Workstation Optional (v. 7) - noarch 3. Description: firewalld is a firewall service daemon that provides a dynamic customizable firewall with a D-Bus interface. The following packages have been upgraded to a newer upstream version: firewalld (0.4.3.2). Any locally logged in user could use this flaw to tamper or change firewall settings. (CVE-2016-5410) Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.3 Release Notes linked from the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1066037 - firewall-config should allow unspecifying zone binding for interface 1136801 - a rule added into IN_<zone>_allow chain with 'permanent direct' interface doesn't exist after reload 1147500 - RFE: add command to firewall-cmd showing details of a service 1147951 - firewall-cmd should support a default logging option. 1219717 - Add radius TCP to policy. 1220196 - Firewalld missing policies for imap and smtps 1220467 - Option '--quiet' is needed in firewall-offline-cmd command line. 1237242 - Error: RT_TO_PERM_FAILED: zone 'dmz' : ZONE_CONFLICT when doing --runtime-to-permanent 1273296 - [ALL_LANG][firewalld] Translation incomplete 1273888 - Firewalld DefaultZone change breaking on --reload 1281416 - Headless firewall-config over ssh. firewall-config missing dependencies 1285769 - Fails to start without ip6t_rpfilter module 1292926 - firewalld --new-service & malformed xml ?? 1296573 - xsd specification nor service daemon checks whether tags are specified more than once if they must not 1301573 - firewalld reporting errors in logs for failed iptables commands 1302802 - Rebase to the new upstream and new release 1303026 - firewalld - mistake in <ports> renders ports remain closed, silently. 1305434 - Firewalld hangs with a NIS configuration 1313023 - command "systemctl reload firewalld" stops firewalld 1313845 - Backport After=dbus.service 1325335 - [RFE] allow negation of icmp-blocks zone configuration field 1326130 - firewalld stops traffic from/to 127.0.0.1 when masquerading is enabled in default zone 1326462 - rich rule with destination and no element give error 1347530 - Add port for corosync-qnetd to high-availability service 1349903 - FirewallD fails to parse direct rules with a lot of destination addresses 1357050 - exit codes don't match error messages in firewall-cmd 1360135 - CVE-2016-5410 firewalld: Firewall configuration can be modified by any logged in user 1360894 - Print errors and warnings to stderr 1365198 - firewall-cmd ipset --add-entries-from-file broken 1367038 - firewall-cmd crashes if /run/dbus/system_bus_socket does not exist 1368949 - Trying to get the description for a firewalld zone from command line throws error and prints traceback information. 1371116 - Load helper modules in FirewallZoneTransaction 1373260 - An error in the permanent direct rules will make all other direct rules using a table other than the filter table not applicable. 1374799 - exclude firewallctl from firewalld v0.4.3.2 update 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: firewalld-0.4.3.2-8.el7.src.rpm noarch: firewall-config-0.4.3.2-8.el7.noarch.rpm firewalld-0.4.3.2-8.el7.noarch.rpm firewalld-filesystem-0.4.3.2-8.el7.noarch.rpm python-firewall-0.4.3.2-8.el7.noarch.rpm Red Hat Enterprise Linux Client Optional (v. 7): noarch: firewall-applet-0.4.3.2-8.el7.noarch.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: firewalld-0.4.3.2-8.el7.src.rpm noarch: firewalld-0.4.3.2-8.el7.noarch.rpm firewalld-filesystem-0.4.3.2-8.el7.noarch.rpm python-firewall-0.4.3.2-8.el7.noarch.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): noarch: firewall-applet-0.4.3.2-8.el7.noarch.rpm firewall-config-0.4.3.2-8.el7.noarch.rpm Red Hat Enterprise Linux Server (v. 7): Source: firewalld-0.4.3.2-8.el7.src.rpm noarch: firewall-config-0.4.3.2-8.el7.noarch.rpm firewalld-0.4.3.2-8.el7.noarch.rpm firewalld-filesystem-0.4.3.2-8.el7.noarch.rpm python-firewall-0.4.3.2-8.el7.noarch.rpm Red Hat Enterprise Linux Server Optional (v. 7): noarch: firewall-applet-0.4.3.2-8.el7.noarch.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: firewalld-0.4.3.2-8.el7.src.rpm noarch: firewall-config-0.4.3.2-8.el7.noarch.rpm firewalld-0.4.3.2-8.el7.noarch.rpm firewalld-filesystem-0.4.3.2-8.el7.noarch.rpm python-firewall-0.4.3.2-8.el7.noarch.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): noarch: firewall-applet-0.4.3.2-8.el7.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-5410 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/7.3_Release_Notes/index.html 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFYGvz+XlSAg2UNWIIRAnYNAKC+tOJpkB9nwgqe+K/AaoZBzPX3RQCeM8De T81FpcV1vTa45DoiZC5wdUk= =+0pl -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201701-70 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: Firewalld: Improper authentication methods Date: January 29, 2017 Bugs: #591458 ID: 201701-70 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== A vulnerability in Firewalld allows firewall configurations to be modified by unauthenticated users. Background ========== Firewalld provides a dynamically managed firewall with support for network/firewall zones to define the trust level of network connections or interfaces. This is due to how Firewalld handles authentication via polkit which is not properly applied to 5 particular functions to include: addPassthrough, removePassthrough, addEntry, removeEntry, and setEntries. Impact ====== A local attacker could tamper or change firewall settings leading to the additional exposure of systems to include unauthorized remote access. Workaround ========== There is no known workaround at this time. Resolution ========== All Firewalld users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-firewall/firewalld-0.4.3.3"= References ========== [ 1 ] CVE-2016-5410 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5410 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/201701-70 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2017 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 --0Gjuansk3tW7pCmf5JAuWnfVtAeiNASDT--

Trust: 2.25

sources: NVD: CVE-2016-5410 // JVNDB: JVNDB-2016-008467 // BID: 92481 // VULHUB: VHN-94229 // VULMON: CVE-2016-5410 // PACKETSTORM: 139525 // PACKETSTORM: 140775

AFFECTED PRODUCTS

vendor:redhatmodel:enterprise linux serverscope:eqversion:7.0

Trust: 1.0

vendor:redhatmodel:enterprise linux hpc nodescope:eqversion:7.0

Trust: 1.0

vendor:redhatmodel:enterprise linux workstationscope:eqversion:7.0

Trust: 1.0

vendor:firewalldmodel:firewalldscope:lteversion:0.4.3.2

Trust: 1.0

vendor:redhatmodel:enterprise linux desktopscope:eqversion:7.0

Trust: 1.0

vendor:firewalldmodel:firewalldscope:eqversion:0.4.3.2

Trust: 0.9

vendor:firewalldmodel:firewalldscope:ltversion:0.4.3.3

Trust: 0.8

vendor:red hatmodel:enterprise linux desktopscope:eqversion:7.0

Trust: 0.8

vendor:red hatmodel:enterprise linux hpc nodescope:eqversion:7.0

Trust: 0.8

vendor:red hatmodel:enterprise linux serverscope:eqversion:7.0

Trust: 0.8

vendor:red hatmodel:enterprise linux workstationscope:eqversion:7.0

Trust: 0.8

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:firewalldmodel:firewalldscope:eqversion:0.4.3

Trust: 0.3

vendor:firewalldmodel:firewalldscope:eqversion:0.4

Trust: 0.3

vendor:firewalldmodel:firewalldscope:eqversion:0.3.13

Trust: 0.3

vendor:firewalldmodel:firewalldscope:eqversion:0.3.12

Trust: 0.3

vendor:firewalldmodel:firewalldscope:eqversion:0.4.3.1

Trust: 0.3

vendor:firewalldmodel:firewalldscope:eqversion:0.4.1.1

Trust: 0.3

vendor:firewalldmodel:firewalldscope:neversion:0.4.3.3

Trust: 0.3

sources: BID: 92481 // JVNDB: JVNDB-2016-008467 // CNNVD: CNNVD-201608-308 // NVD: CVE-2016-5410

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-5410
value: MEDIUM

Trust: 1.0

NVD: CVE-2016-5410
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201608-308
value: LOW

Trust: 0.6

VULHUB: VHN-94229
value: LOW

Trust: 0.1

VULMON: CVE-2016-5410
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2016-5410
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:N/I:P/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-94229
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:N/I:P/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-5410
baseSeverity: MEDIUM
baseScore: 5.5
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 1.8
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-94229 // VULMON: CVE-2016-5410 // JVNDB: JVNDB-2016-008467 // CNNVD: CNNVD-201608-308 // NVD: CVE-2016-5410

PROBLEMTYPE DATA

problemtype:CWE-287

Trust: 1.9

sources: VULHUB: VHN-94229 // JVNDB: JVNDB-2016-008467 // NVD: CVE-2016-5410

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201608-308

TYPE

authorization issue

Trust: 0.6

sources: CNNVD: CNNVD-201608-308

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-008467

PATCH

title:firewalld 0.4.3.3 releaseurl:http://www.firewalld.org/2016/08/firewalld-0-4-3-3-release

Trust: 0.8

title:RHSA-2016:2597url:http://rhn.redhat.com/errata/RHSA-2016-2597.html

Trust: 0.8

title:Bug 1360135url:https://bugzilla.redhat.com/show_bug.cgi?id=1360135

Trust: 0.8

title:FirewallD Repair measures for security bypass vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=63675

Trust: 0.6

title:Red Hat: Moderate: firewalld security, bug fix, and enhancement updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162597 - Security Advisory

Trust: 0.1

title:Debian CVElist Bug Report Logs: firewalld: CVE-2016-5410: Firewall configuration can be modified by any logged in userurl:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=13e91998e11dcbf9abd7c967ac888414

Trust: 0.1

title:Red Hat: CVE-2016-5410url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2016-5410

Trust: 0.1

title:Oracle Linux Bulletins: Oracle Linux Bulletin - October 2016url:https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins&qid=13f3551b67d913fba90df4b2c0dae0bf

Trust: 0.1

sources: VULMON: CVE-2016-5410 // JVNDB: JVNDB-2016-008467 // CNNVD: CNNVD-201608-308

EXTERNAL IDS

db:NVDid:CVE-2016-5410

Trust: 3.1

db:BIDid:92481

Trust: 2.1

db:OPENWALLid:OSS-SECURITY/2016/08/16/3

Trust: 1.8

db:JVNDBid:JVNDB-2016-008467

Trust: 0.8

db:CNNVDid:CNNVD-201608-308

Trust: 0.7

db:PACKETSTORMid:140775

Trust: 0.2

db:PACKETSTORMid:139525

Trust: 0.2

db:VULHUBid:VHN-94229

Trust: 0.1

db:VULMONid:CVE-2016-5410

Trust: 0.1

sources: VULHUB: VHN-94229 // VULMON: CVE-2016-5410 // BID: 92481 // JVNDB: JVNDB-2016-008467 // PACKETSTORM: 139525 // PACKETSTORM: 140775 // CNNVD: CNNVD-201608-308 // NVD: CVE-2016-5410

REFERENCES

url:http://www.securityfocus.com/bid/92481

Trust: 1.9

url:https://security.gentoo.org/glsa/201701-70

Trust: 1.9

url:http://rhn.redhat.com/errata/rhsa-2016-2597.html

Trust: 1.9

url:http://www.firewalld.org/2016/08/firewalld-0-4-3-3-release

Trust: 1.8

url:https://bugzilla.redhat.com/show_bug.cgi?id=1360135

Trust: 1.8

url:http://www.openwall.com/lists/oss-security/2016/08/16/3

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2016-5410

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/dpm3guqru2kprxdeqlamcdqeaiarjsbt/

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/zbjmylgrvkipjei3vzj4wqzt7fbq5bko/

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/zbjmylgrvkipjei3vzj4wqzt7fbq5bko/

Trust: 0.8

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/dpm3guqru2kprxdeqlamcdqeaiarjsbt/

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-5410

Trust: 0.8

url:http://seclists.org/oss-sec/2016/q3/291

Trust: 0.3

url:https://github.com/t-woerner/firewalld

Trust: 0.3

url:http://www.firewalld.org/

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2016-5410

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/287.html

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2016:2597

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.3_release_notes/index.html

Trust: 0.1

url:https://bugzilla.redhat.com/):

Trust: 0.1

url:https://access.redhat.com/security/team/key/

Trust: 0.1

url:https://access.redhat.com/articles/11258

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.1

url:https://access.redhat.com/security/team/contact/

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5410

Trust: 0.1

url:https://security.gentoo.org/

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

sources: VULHUB: VHN-94229 // VULMON: CVE-2016-5410 // BID: 92481 // JVNDB: JVNDB-2016-008467 // PACKETSTORM: 139525 // PACKETSTORM: 140775 // CNNVD: CNNVD-201608-308 // NVD: CVE-2016-5410

CREDITS

Huzaifa Sidhpurwala.

Trust: 0.9

sources: BID: 92481 // CNNVD: CNNVD-201608-308

SOURCES

db:VULHUBid:VHN-94229
db:VULMONid:CVE-2016-5410
db:BIDid:92481
db:JVNDBid:JVNDB-2016-008467
db:PACKETSTORMid:139525
db:PACKETSTORMid:140775
db:CNNVDid:CNNVD-201608-308
db:NVDid:CVE-2016-5410

LAST UPDATE DATE

2024-11-23T22:52:31.695000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-94229date:2017-04-25T00:00:00
db:VULMONid:CVE-2016-5410date:2017-04-25T00:00:00
db:BIDid:92481date:2017-02-02T06:03:00
db:JVNDBid:JVNDB-2016-008467date:2017-05-19T00:00:00
db:CNNVDid:CNNVD-201608-308date:2017-04-20T00:00:00
db:NVDid:CVE-2016-5410date:2024-11-21T02:54:15.697

SOURCES RELEASE DATE

db:VULHUBid:VHN-94229date:2017-04-19T00:00:00
db:VULMONid:CVE-2016-5410date:2017-04-19T00:00:00
db:BIDid:92481date:2016-08-16T00:00:00
db:JVNDBid:JVNDB-2016-008467date:2017-05-19T00:00:00
db:PACKETSTORMid:139525date:2016-11-04T20:08:25
db:PACKETSTORMid:140775date:2017-01-30T16:57:47
db:CNNVDid:CNNVD-201608-308date:2016-08-17T00:00:00
db:NVDid:CVE-2016-5410date:2017-04-19T14:59:00.207