{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2018-16877","assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","dateUpdated":"2024-08-05T10:32:54.207Z","dateReserved":"2018-09-11T00:00:00.000Z","datePublished":"2019-04-18T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat","dateUpdated":"2023-09-29T10:06:20.138Z"},"descriptions":[{"lang":"en","value":"A flaw was found in the way pacemaker's client-server authentication was implemented in versions up to and including 2.0.0. A local attacker could use this flaw, and combine it with other IPC weaknesses, to achieve local privilege escalation."}],"affected":[{"vendor":"ClusterLabs","product":"pacemaker","versions":[{"version":"affects up to and including Pacemaker-2.0.0","status":"affected"}]}],"references":[{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16877"},{"url":"https://github.com/ClusterLabs/pacemaker/pull/1749"},{"name":"USN-3952-1","tags":["vendor-advisory"],"url":"https://usn.ubuntu.com/3952-1/"},{"name":"108042","tags":["vdb-entry"],"url":"http://www.securityfocus.com/bid/108042"},{"name":"FEDORA-2019-e4c8de3fb7","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HR6QUYGML735EI3HEEHYRDW7EG73BUH2/"},{"name":"FEDORA-2019-e71f6f36ac","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3GCWFO7GL6MBU6C4BGFO3P6L77DIBBF3/"},{"name":"FEDORA-2019-b502250ba4","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FY4M4RMIG2POKC6OOFQODGKPRYXHET2F/"},{"name":"openSUSE-SU-2019:1342","tags":["vendor-advisory"],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00012.html"},{"name":"openSUSE-SU-2019:1400","tags":["vendor-advisory"],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00034.html"},{"name":"RHSA-2019:1278","tags":["vendor-advisory"],"url":"https://access.redhat.com/errata/RHSA-2019:1278"},{"name":"RHSA-2019:1279","tags":["vendor-advisory"],"url":"https://access.redhat.com/errata/RHSA-2019:1279"},{"name":"[debian-lts-announce] 20210106 [SECURITY] [DLA 2519-1] pacemaker security update","tags":["mailing-list"],"url":"https://lists.debian.org/debian-lts-announce/2021/01/msg00007.html"},{"name":"GLSA-202309-09","tags":["vendor-advisory"],"url":"https://security.gentoo.org/glsa/202309-09"}],"metrics":[{"cvssV3_0":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-287","cweId":"CWE-287"}]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-05T10:32:54.207Z"},"title":"CVE Program Container","references":[{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16877","tags":["x_transferred"]},{"url":"https://github.com/ClusterLabs/pacemaker/pull/1749","tags":["x_transferred"]},{"name":"USN-3952-1","tags":["vendor-advisory","x_transferred"],"url":"https://usn.ubuntu.com/3952-1/"},{"name":"108042","tags":["vdb-entry","x_transferred"],"url":"http://www.securityfocus.com/bid/108042"},{"name":"FEDORA-2019-e4c8de3fb7","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HR6QUYGML735EI3HEEHYRDW7EG73BUH2/"},{"name":"FEDORA-2019-e71f6f36ac","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3GCWFO7GL6MBU6C4BGFO3P6L77DIBBF3/"},{"name":"FEDORA-2019-b502250ba4","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FY4M4RMIG2POKC6OOFQODGKPRYXHET2F/"},{"name":"openSUSE-SU-2019:1342","tags":["vendor-advisory","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00012.html"},{"name":"openSUSE-SU-2019:1400","tags":["vendor-advisory","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00034.html"},{"name":"RHSA-2019:1278","tags":["vendor-advisory","x_transferred"],"url":"https://access.redhat.com/errata/RHSA-2019:1278"},{"name":"RHSA-2019:1279","tags":["vendor-advisory","x_transferred"],"url":"https://access.redhat.com/errata/RHSA-2019:1279"},{"name":"[debian-lts-announce] 20210106 [SECURITY] [DLA 2519-1] pacemaker security update","tags":["mailing-list","x_transferred"],"url":"https://lists.debian.org/debian-lts-announce/2021/01/msg00007.html"},{"name":"GLSA-202309-09","tags":["vendor-advisory","x_transferred"],"url":"https://security.gentoo.org/glsa/202309-09"}]}]}}