![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2016-5410 |
Description: | firewalld.py in firewalld before 0.4.3.3 allows local users to bypass authentication and modify firewall configurations via the (1) addPassthrough, (2) removePassthrough, (3) addEntry, (4) removeEntry, or (5) setEntries D-Bus API method. |
Test IDs: | 1.3.6.1.4.1.25623.1.0.809149 1.3.6.1.4.1.25623.1.0.872089 1.3.6.1.4.1.25623.1.1.2.2019.2377 1.3.6.1.4.1.25623.1.0.871681 |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2016-5410 BugTraq ID: 92481 http://www.securityfocus.com/bid/92481 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBJMYLGRVKIPJEI3VZJ4WQZT7FBQ5BKO/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DPM3GUQRU2KPRXDEQLAMCDQEAIARJSBT/ https://security.gentoo.org/glsa/201701-70 http://www.openwall.com/lists/oss-security/2016/08/16/3 RedHat Security Advisories: RHSA-2016:2597 http://rhn.redhat.com/errata/RHSA-2016-2597.html |