{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2018-16878","assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","dateUpdated":"2024-08-05T10:32:54.240Z","dateReserved":"2018-09-11T00:00:00.000Z","datePublished":"2019-04-18T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat","dateUpdated":"2023-09-29T10:06:22.235Z"},"descriptions":[{"lang":"en","value":"A flaw was found in pacemaker up to and including version 2.0.1. An insufficient verification inflicted preference of uncontrolled processes can lead to DoS"}],"affected":[{"vendor":"ClusterLabs","product":"pacemaker","versions":[{"version":"affects up to and including version 2.0.1","status":"affected"}]}],"references":[{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16878"},{"url":"https://github.com/ClusterLabs/pacemaker/pull/1749"},{"name":"108039","tags":["vdb-entry"],"url":"http://www.securityfocus.com/bid/108039"},{"name":"USN-3952-1","tags":["vendor-advisory"],"url":"https://usn.ubuntu.com/3952-1/"},{"name":"FEDORA-2019-e4c8de3fb7","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HR6QUYGML735EI3HEEHYRDW7EG73BUH2/"},{"name":"FEDORA-2019-e71f6f36ac","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3GCWFO7GL6MBU6C4BGFO3P6L77DIBBF3/"},{"name":"FEDORA-2019-b502250ba4","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FY4M4RMIG2POKC6OOFQODGKPRYXHET2F/"},{"name":"openSUSE-SU-2019:1342","tags":["vendor-advisory"],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00012.html"},{"name":"openSUSE-SU-2019:1400","tags":["vendor-advisory"],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00034.html"},{"name":"RHSA-2019:1278","tags":["vendor-advisory"],"url":"https://access.redhat.com/errata/RHSA-2019:1278"},{"name":"RHSA-2019:1279","tags":["vendor-advisory"],"url":"https://access.redhat.com/errata/RHSA-2019:1279"},{"name":"[debian-lts-announce] 20210106 [SECURITY] [DLA 2519-1] pacemaker security update","tags":["mailing-list"],"url":"https://lists.debian.org/debian-lts-announce/2021/01/msg00007.html"},{"name":"GLSA-202309-09","tags":["vendor-advisory"],"url":"https://security.gentoo.org/glsa/202309-09"}],"metrics":[{"cvssV3_0":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":6.2,"baseSeverity":"MEDIUM"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-400","cweId":"CWE-400"}]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-05T10:32:54.240Z"},"title":"CVE Program Container","references":[{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16878","tags":["x_transferred"]},{"url":"https://github.com/ClusterLabs/pacemaker/pull/1749","tags":["x_transferred"]},{"name":"108039","tags":["vdb-entry","x_transferred"],"url":"http://www.securityfocus.com/bid/108039"},{"name":"USN-3952-1","tags":["vendor-advisory","x_transferred"],"url":"https://usn.ubuntu.com/3952-1/"},{"name":"FEDORA-2019-e4c8de3fb7","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HR6QUYGML735EI3HEEHYRDW7EG73BUH2/"},{"name":"FEDORA-2019-e71f6f36ac","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3GCWFO7GL6MBU6C4BGFO3P6L77DIBBF3/"},{"name":"FEDORA-2019-b502250ba4","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FY4M4RMIG2POKC6OOFQODGKPRYXHET2F/"},{"name":"openSUSE-SU-2019:1342","tags":["vendor-advisory","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00012.html"},{"name":"openSUSE-SU-2019:1400","tags":["vendor-advisory","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00034.html"},{"name":"RHSA-2019:1278","tags":["vendor-advisory","x_transferred"],"url":"https://access.redhat.com/errata/RHSA-2019:1278"},{"name":"RHSA-2019:1279","tags":["vendor-advisory","x_transferred"],"url":"https://access.redhat.com/errata/RHSA-2019:1279"},{"name":"[debian-lts-announce] 20210106 [SECURITY] [DLA 2519-1] pacemaker security update","tags":["mailing-list","x_transferred"],"url":"https://lists.debian.org/debian-lts-announce/2021/01/msg00007.html"},{"name":"GLSA-202309-09","tags":["vendor-advisory","x_transferred"],"url":"https://security.gentoo.org/glsa/202309-09"}]}]}}