{
  "threat_severity" : "Important",
  "public_date" : "2019-04-17T04:30:00Z",
  "bugzilla" : {
    "description" : "pacemaker: Insufficient local IPC client-server authentication on the client's side can lead to local privesc",
    "id" : "1652646",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1652646"
  },
  "cvss3" : {
    "cvss3_base_score" : "8.8",
    "cvss3_scoring_vector" : "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-287",
  "details" : [ "A flaw was found in the way pacemaker's client-server authentication was implemented in versions up to and including 2.0.0. A local attacker could use this flaw, and combine it with other IPC weaknesses, to achieve local privilege escalation.", "A flaw was found in the way pacemaker's client-server authentication was implemented. A local attacker could use this flaw, and combine it with other IPC weaknesses, to achieve local privilege escalation." ],
  "statement" : "This is essentially a design level security flaw which can be combined with other flaws to achieve local privilege escalation for clusters running pacemaker. The attacker needs to have access to the cluster node running pacemaker (AV:L). The attacker can use easily use the design flaw via the confused deputy problem to run the exploit (AC:L), also needs to have login access to the pacemaker node to run the exploit (PR:L). \nDue to the elevated privileges obtained, there is an impact to the system beyond the pacemaker node itself (S:C). Lastly due to the attacker's ability to run arbitrary code as root, confidentiality, integrity, and availability of the system is affected. (CIA:H)",
  "acknowledgement" : "This issue was discovered by Jan Pokorný (Red Hat).",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 7",
    "release_date" : "2019-05-27T00:00:00Z",
    "advisory" : "RHSA-2019:1278",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7",
    "package" : "pacemaker-0:1.1.19-8.el7_6.5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2019-05-27T00:00:00Z",
    "advisory" : "RHSA-2019:1279",
    "cpe" : "cpe:/a:redhat:enterprise_linux:8",
    "package" : "pacemaker-0:2.0.1-4.el8_0.3"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Will not fix",
    "package_name" : "pacemaker",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Storage 3",
    "fix_state" : "Will not fix",
    "package_name" : "pacemaker",
    "cpe" : "cpe:/a:redhat:storage:3"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2018-16877\nhttps://nvd.nist.gov/vuln/detail/CVE-2018-16877" ],
  "name" : "CVE-2018-16877",
  "csaw" : false
}