RHSA-2016:2597

Vulnerability from csaf_redhat - Published: 2016-11-03 08:11 - Updated: 2025-11-21 17:58
Summary
Red Hat Security Advisory: firewalld security, bug fix, and enhancement update
Severity
Moderate
Notes
Topic: An update for firewalld is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details: firewalld is a firewall service daemon that provides a dynamic customizable firewall with a D-Bus interface. The following packages have been upgraded to a newer upstream version: firewalld (0.4.3.2). (BZ#1302802) Security Fix(es): * A flaw was found in the way firewalld allowed certain firewall configurations to be modified by unauthenticated users. Any locally logged in user could use this flaw to tamper or change firewall settings. (CVE-2016-5410) Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.3 Release Notes linked from the References section.
Terms of Use: This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

A flaw was found in the way firewalld allowed certain firewall configurations to be modified by unauthenticated users. Any locally logged in user could use this flaw to tamper or change firewall settings.

CWE-306 - Missing Authentication for Critical Function
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2016:2597
References
https://access.redhat.com/errata/RHSA-2016:2597 self
https://access.redhat.com/security/updates/classi… external
https://access.redhat.com/documentation/en-US/Red… external
https://bugzilla.redhat.com/show_bug.cgi?id=1066037 external
https://bugzilla.redhat.com/show_bug.cgi?id=1136801 external
https://bugzilla.redhat.com/show_bug.cgi?id=1147500 external
https://bugzilla.redhat.com/show_bug.cgi?id=1147951 external
https://bugzilla.redhat.com/show_bug.cgi?id=1219717 external
https://bugzilla.redhat.com/show_bug.cgi?id=1220196 external
https://bugzilla.redhat.com/show_bug.cgi?id=1220467 external
https://bugzilla.redhat.com/show_bug.cgi?id=1237242 external
https://bugzilla.redhat.com/show_bug.cgi?id=1273296 external
https://bugzilla.redhat.com/show_bug.cgi?id=1273888 external
https://bugzilla.redhat.com/show_bug.cgi?id=1281416 external
https://bugzilla.redhat.com/show_bug.cgi?id=1285769 external
https://bugzilla.redhat.com/show_bug.cgi?id=1292926 external
https://bugzilla.redhat.com/show_bug.cgi?id=1296573 external
https://bugzilla.redhat.com/show_bug.cgi?id=1301573 external
https://bugzilla.redhat.com/show_bug.cgi?id=1302802 external
https://bugzilla.redhat.com/show_bug.cgi?id=1303026 external
https://bugzilla.redhat.com/show_bug.cgi?id=1305434 external
https://bugzilla.redhat.com/show_bug.cgi?id=1313023 external
https://bugzilla.redhat.com/show_bug.cgi?id=1313845 external
https://bugzilla.redhat.com/show_bug.cgi?id=1325335 external
https://bugzilla.redhat.com/show_bug.cgi?id=1326130 external
https://bugzilla.redhat.com/show_bug.cgi?id=1326462 external
https://bugzilla.redhat.com/show_bug.cgi?id=1347530 external
https://bugzilla.redhat.com/show_bug.cgi?id=1349903 external
https://bugzilla.redhat.com/show_bug.cgi?id=1357050 external
https://bugzilla.redhat.com/show_bug.cgi?id=1360135 external
https://bugzilla.redhat.com/show_bug.cgi?id=1360894 external
https://bugzilla.redhat.com/show_bug.cgi?id=1361669 external
https://bugzilla.redhat.com/show_bug.cgi?id=1365198 external
https://bugzilla.redhat.com/show_bug.cgi?id=1367038 external
https://bugzilla.redhat.com/show_bug.cgi?id=1368949 external
https://bugzilla.redhat.com/show_bug.cgi?id=1371116 external
https://bugzilla.redhat.com/show_bug.cgi?id=1373260 external
https://bugzilla.redhat.com/show_bug.cgi?id=1374799 external
https://security.access.redhat.com/data/csaf/v2/a… self
https://access.redhat.com/security/cve/CVE-2016-5410 self
https://bugzilla.redhat.com/show_bug.cgi?id=1360135 external
https://www.cve.org/CVERecord?id=CVE-2016-5410 external
https://nvd.nist.gov/vuln/detail/CVE-2016-5410 external

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for firewalld is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "firewalld is a firewall service daemon that provides a dynamic customizable firewall with a D-Bus interface.\n\nThe following packages have been upgraded to a newer upstream version: firewalld (0.4.3.2). (BZ#1302802)\n\nSecurity Fix(es):\n\n* A flaw was found in the way firewalld allowed certain firewall configurations to be modified by unauthenticated users. Any locally logged in user could use this flaw to tamper or change firewall settings. (CVE-2016-5410)\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 7.3 Release Notes linked from the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2016:2597",
        "url": "https://access.redhat.com/errata/RHSA-2016:2597"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/7.3_Release_Notes/index.html",
        "url": "https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/7.3_Release_Notes/index.html"
      },
      {
        "category": "external",
        "summary": "1066037",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1066037"
      },
      {
        "category": "external",
        "summary": "1136801",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1136801"
      },
      {
        "category": "external",
        "summary": "1147500",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1147500"
      },
      {
        "category": "external",
        "summary": "1147951",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1147951"
      },
      {
        "category": "external",
        "summary": "1219717",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1219717"
      },
      {
        "category": "external",
        "summary": "1220196",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220196"
      },
      {
        "category": "external",
        "summary": "1220467",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220467"
      },
      {
        "category": "external",
        "summary": "1237242",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1237242"
      },
      {
        "category": "external",
        "summary": "1273296",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1273296"
      },
      {
        "category": "external",
        "summary": "1273888",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1273888"
      },
      {
        "category": "external",
        "summary": "1281416",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1281416"
      },
      {
        "category": "external",
        "summary": "1285769",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1285769"
      },
      {
        "category": "external",
        "summary": "1292926",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1292926"
      },
      {
        "category": "external",
        "summary": "1296573",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1296573"
      },
      {
        "category": "external",
        "summary": "1301573",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1301573"
      },
      {
        "category": "external",
        "summary": "1302802",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1302802"
      },
      {
        "category": "external",
        "summary": "1303026",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1303026"
      },
      {
        "category": "external",
        "summary": "1305434",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1305434"
      },
      {
        "category": "external",
        "summary": "1313023",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1313023"
      },
      {
        "category": "external",
        "summary": "1313845",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1313845"
      },
      {
        "category": "external",
        "summary": "1325335",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1325335"
      },
      {
        "category": "external",
        "summary": "1326130",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1326130"
      },
      {
        "category": "external",
        "summary": "1326462",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1326462"
      },
      {
        "category": "external",
        "summary": "1347530",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1347530"
      },
      {
        "category": "external",
        "summary": "1349903",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1349903"
      },
      {
        "category": "external",
        "summary": "1357050",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1357050"
      },
      {
        "category": "external",
        "summary": "1360135",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1360135"
      },
      {
        "category": "external",
        "summary": "1360894",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1360894"
      },
      {
        "category": "external",
        "summary": "1361669",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361669"
      },
      {
        "category": "external",
        "summary": "1365198",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1365198"
      },
      {
        "category": "external",
        "summary": "1367038",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1367038"
      },
      {
        "category": "external",
        "summary": "1368949",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1368949"
      },
      {
        "category": "external",
        "summary": "1371116",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1371116"
      },
      {
        "category": "external",
        "summary": "1373260",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1373260"
      },
      {
        "category": "external",
        "summary": "1374799",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1374799"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_2597.json"
      }
    ],
    "title": "Red Hat Security Advisory: firewalld security, bug fix, and enhancement update",
    "tracking": {
      "current_release_date": "2025-11-21T17:58:24+00:00",
      "generator": {
        "date": "2025-11-21T17:58:24+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.12"
        }
      },
      "id": "RHSA-2016:2597",
      "initial_release_date": "2016-11-03T08:11:47+00:00",
      "revision_history": [
        {
          "date": "2016-11-03T08:11:47+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2016-11-03T08:11:47+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-11-21T17:58:24+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Client (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Client (v. 7)",
                  "product_id": "7Client",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Client Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Client Optional (v. 7)",
                  "product_id": "7Client-optional",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
                  "product_id": "7ComputeNode",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
                  "product_id": "7ComputeNode-optional",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server (v. 7)",
                  "product_id": "7Server",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional (v. 7)",
                  "product_id": "7Server-optional",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Workstation (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Workstation (v. 7)",
                  "product_id": "7Workstation",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
                  "product_id": "7Workstation-optional",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "firewall-applet-0:0.4.3.2-8.el7.noarch",
                "product": {
                  "name": "firewall-applet-0:0.4.3.2-8.el7.noarch",
                  "product_id": "firewall-applet-0:0.4.3.2-8.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/firewall-applet@0.4.3.2-8.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "firewalld-0:0.4.3.2-8.el7.noarch",
                "product": {
                  "name": "firewalld-0:0.4.3.2-8.el7.noarch",
                  "product_id": "firewalld-0:0.4.3.2-8.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/firewalld@0.4.3.2-8.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "firewall-config-0:0.4.3.2-8.el7.noarch",
                "product": {
                  "name": "firewall-config-0:0.4.3.2-8.el7.noarch",
                  "product_id": "firewall-config-0:0.4.3.2-8.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/firewall-config@0.4.3.2-8.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-firewall-0:0.4.3.2-8.el7.noarch",
                "product": {
                  "name": "python-firewall-0:0.4.3.2-8.el7.noarch",
                  "product_id": "python-firewall-0:0.4.3.2-8.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-firewall@0.4.3.2-8.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "firewalld-filesystem-0:0.4.3.2-8.el7.noarch",
                "product": {
                  "name": "firewalld-filesystem-0:0.4.3.2-8.el7.noarch",
                  "product_id": "firewalld-filesystem-0:0.4.3.2-8.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/firewalld-filesystem@0.4.3.2-8.el7?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "firewalld-0:0.4.3.2-8.el7.src",
                "product": {
                  "name": "firewalld-0:0.4.3.2-8.el7.src",
                  "product_id": "firewalld-0:0.4.3.2-8.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/firewalld@0.4.3.2-8.el7?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firewall-applet-0:0.4.3.2-8.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional:firewall-applet-0:0.4.3.2-8.el7.noarch"
        },
        "product_reference": "firewall-applet-0:0.4.3.2-8.el7.noarch",
        "relates_to_product_reference": "7Client-optional"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firewall-config-0:0.4.3.2-8.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional:firewall-config-0:0.4.3.2-8.el7.noarch"
        },
        "product_reference": "firewall-config-0:0.4.3.2-8.el7.noarch",
        "relates_to_product_reference": "7Client-optional"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firewalld-0:0.4.3.2-8.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional:firewalld-0:0.4.3.2-8.el7.noarch"
        },
        "product_reference": "firewalld-0:0.4.3.2-8.el7.noarch",
        "relates_to_product_reference": "7Client-optional"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firewalld-0:0.4.3.2-8.el7.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional:firewalld-0:0.4.3.2-8.el7.src"
        },
        "product_reference": "firewalld-0:0.4.3.2-8.el7.src",
        "relates_to_product_reference": "7Client-optional"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firewalld-filesystem-0:0.4.3.2-8.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional:firewalld-filesystem-0:0.4.3.2-8.el7.noarch"
        },
        "product_reference": "firewalld-filesystem-0:0.4.3.2-8.el7.noarch",
        "relates_to_product_reference": "7Client-optional"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-firewall-0:0.4.3.2-8.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional:python-firewall-0:0.4.3.2-8.el7.noarch"
        },
        "product_reference": "python-firewall-0:0.4.3.2-8.el7.noarch",
        "relates_to_product_reference": "7Client-optional"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firewall-applet-0:0.4.3.2-8.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client:firewall-applet-0:0.4.3.2-8.el7.noarch"
        },
        "product_reference": "firewall-applet-0:0.4.3.2-8.el7.noarch",
        "relates_to_product_reference": "7Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firewall-config-0:0.4.3.2-8.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client:firewall-config-0:0.4.3.2-8.el7.noarch"
        },
        "product_reference": "firewall-config-0:0.4.3.2-8.el7.noarch",
        "relates_to_product_reference": "7Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firewalld-0:0.4.3.2-8.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client:firewalld-0:0.4.3.2-8.el7.noarch"
        },
        "product_reference": "firewalld-0:0.4.3.2-8.el7.noarch",
        "relates_to_product_reference": "7Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firewalld-0:0.4.3.2-8.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client:firewalld-0:0.4.3.2-8.el7.src"
        },
        "product_reference": "firewalld-0:0.4.3.2-8.el7.src",
        "relates_to_product_reference": "7Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firewalld-filesystem-0:0.4.3.2-8.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client:firewalld-filesystem-0:0.4.3.2-8.el7.noarch"
        },
        "product_reference": "firewalld-filesystem-0:0.4.3.2-8.el7.noarch",
        "relates_to_product_reference": "7Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-firewall-0:0.4.3.2-8.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client:python-firewall-0:0.4.3.2-8.el7.noarch"
        },
        "product_reference": "python-firewall-0:0.4.3.2-8.el7.noarch",
        "relates_to_product_reference": "7Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firewall-applet-0:0.4.3.2-8.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional:firewall-applet-0:0.4.3.2-8.el7.noarch"
        },
        "product_reference": "firewall-applet-0:0.4.3.2-8.el7.noarch",
        "relates_to_product_reference": "7ComputeNode-optional"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firewall-config-0:0.4.3.2-8.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional:firewall-config-0:0.4.3.2-8.el7.noarch"
        },
        "product_reference": "firewall-config-0:0.4.3.2-8.el7.noarch",
        "relates_to_product_reference": "7ComputeNode-optional"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firewalld-0:0.4.3.2-8.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional:firewalld-0:0.4.3.2-8.el7.noarch"
        },
        "product_reference": "firewalld-0:0.4.3.2-8.el7.noarch",
        "relates_to_product_reference": "7ComputeNode-optional"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firewalld-0:0.4.3.2-8.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional:firewalld-0:0.4.3.2-8.el7.src"
        },
        "product_reference": "firewalld-0:0.4.3.2-8.el7.src",
        "relates_to_product_reference": "7ComputeNode-optional"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firewalld-filesystem-0:0.4.3.2-8.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional:firewalld-filesystem-0:0.4.3.2-8.el7.noarch"
        },
        "product_reference": "firewalld-filesystem-0:0.4.3.2-8.el7.noarch",
        "relates_to_product_reference": "7ComputeNode-optional"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-firewall-0:0.4.3.2-8.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional:python-firewall-0:0.4.3.2-8.el7.noarch"
        },
        "product_reference": "python-firewall-0:0.4.3.2-8.el7.noarch",
        "relates_to_product_reference": "7ComputeNode-optional"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firewall-applet-0:0.4.3.2-8.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
          "product_id": "7ComputeNode:firewall-applet-0:0.4.3.2-8.el7.noarch"
        },
        "product_reference": "firewall-applet-0:0.4.3.2-8.el7.noarch",
        "relates_to_product_reference": "7ComputeNode"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firewall-config-0:0.4.3.2-8.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
          "product_id": "7ComputeNode:firewall-config-0:0.4.3.2-8.el7.noarch"
        },
        "product_reference": "firewall-config-0:0.4.3.2-8.el7.noarch",
        "relates_to_product_reference": "7ComputeNode"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firewalld-0:0.4.3.2-8.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
          "product_id": "7ComputeNode:firewalld-0:0.4.3.2-8.el7.noarch"
        },
        "product_reference": "firewalld-0:0.4.3.2-8.el7.noarch",
        "relates_to_product_reference": "7ComputeNode"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firewalld-0:0.4.3.2-8.el7.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
          "product_id": "7ComputeNode:firewalld-0:0.4.3.2-8.el7.src"
        },
        "product_reference": "firewalld-0:0.4.3.2-8.el7.src",
        "relates_to_product_reference": "7ComputeNode"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firewalld-filesystem-0:0.4.3.2-8.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
          "product_id": "7ComputeNode:firewalld-filesystem-0:0.4.3.2-8.el7.noarch"
        },
        "product_reference": "firewalld-filesystem-0:0.4.3.2-8.el7.noarch",
        "relates_to_product_reference": "7ComputeNode"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-firewall-0:0.4.3.2-8.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
          "product_id": "7ComputeNode:python-firewall-0:0.4.3.2-8.el7.noarch"
        },
        "product_reference": "python-firewall-0:0.4.3.2-8.el7.noarch",
        "relates_to_product_reference": "7ComputeNode"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firewall-applet-0:0.4.3.2-8.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional:firewall-applet-0:0.4.3.2-8.el7.noarch"
        },
        "product_reference": "firewall-applet-0:0.4.3.2-8.el7.noarch",
        "relates_to_product_reference": "7Server-optional"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firewall-config-0:0.4.3.2-8.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional:firewall-config-0:0.4.3.2-8.el7.noarch"
        },
        "product_reference": "firewall-config-0:0.4.3.2-8.el7.noarch",
        "relates_to_product_reference": "7Server-optional"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firewalld-0:0.4.3.2-8.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional:firewalld-0:0.4.3.2-8.el7.noarch"
        },
        "product_reference": "firewalld-0:0.4.3.2-8.el7.noarch",
        "relates_to_product_reference": "7Server-optional"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firewalld-0:0.4.3.2-8.el7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional:firewalld-0:0.4.3.2-8.el7.src"
        },
        "product_reference": "firewalld-0:0.4.3.2-8.el7.src",
        "relates_to_product_reference": "7Server-optional"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firewalld-filesystem-0:0.4.3.2-8.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional:firewalld-filesystem-0:0.4.3.2-8.el7.noarch"
        },
        "product_reference": "firewalld-filesystem-0:0.4.3.2-8.el7.noarch",
        "relates_to_product_reference": "7Server-optional"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-firewall-0:0.4.3.2-8.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional:python-firewall-0:0.4.3.2-8.el7.noarch"
        },
        "product_reference": "python-firewall-0:0.4.3.2-8.el7.noarch",
        "relates_to_product_reference": "7Server-optional"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firewall-applet-0:0.4.3.2-8.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server:firewall-applet-0:0.4.3.2-8.el7.noarch"
        },
        "product_reference": "firewall-applet-0:0.4.3.2-8.el7.noarch",
        "relates_to_product_reference": "7Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firewall-config-0:0.4.3.2-8.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server:firewall-config-0:0.4.3.2-8.el7.noarch"
        },
        "product_reference": "firewall-config-0:0.4.3.2-8.el7.noarch",
        "relates_to_product_reference": "7Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firewalld-0:0.4.3.2-8.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server:firewalld-0:0.4.3.2-8.el7.noarch"
        },
        "product_reference": "firewalld-0:0.4.3.2-8.el7.noarch",
        "relates_to_product_reference": "7Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firewalld-0:0.4.3.2-8.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server:firewalld-0:0.4.3.2-8.el7.src"
        },
        "product_reference": "firewalld-0:0.4.3.2-8.el7.src",
        "relates_to_product_reference": "7Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firewalld-filesystem-0:0.4.3.2-8.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server:firewalld-filesystem-0:0.4.3.2-8.el7.noarch"
        },
        "product_reference": "firewalld-filesystem-0:0.4.3.2-8.el7.noarch",
        "relates_to_product_reference": "7Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-firewall-0:0.4.3.2-8.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server:python-firewall-0:0.4.3.2-8.el7.noarch"
        },
        "product_reference": "python-firewall-0:0.4.3.2-8.el7.noarch",
        "relates_to_product_reference": "7Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firewall-applet-0:0.4.3.2-8.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional:firewall-applet-0:0.4.3.2-8.el7.noarch"
        },
        "product_reference": "firewall-applet-0:0.4.3.2-8.el7.noarch",
        "relates_to_product_reference": "7Workstation-optional"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firewall-config-0:0.4.3.2-8.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional:firewall-config-0:0.4.3.2-8.el7.noarch"
        },
        "product_reference": "firewall-config-0:0.4.3.2-8.el7.noarch",
        "relates_to_product_reference": "7Workstation-optional"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firewalld-0:0.4.3.2-8.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional:firewalld-0:0.4.3.2-8.el7.noarch"
        },
        "product_reference": "firewalld-0:0.4.3.2-8.el7.noarch",
        "relates_to_product_reference": "7Workstation-optional"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firewalld-0:0.4.3.2-8.el7.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional:firewalld-0:0.4.3.2-8.el7.src"
        },
        "product_reference": "firewalld-0:0.4.3.2-8.el7.src",
        "relates_to_product_reference": "7Workstation-optional"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firewalld-filesystem-0:0.4.3.2-8.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional:firewalld-filesystem-0:0.4.3.2-8.el7.noarch"
        },
        "product_reference": "firewalld-filesystem-0:0.4.3.2-8.el7.noarch",
        "relates_to_product_reference": "7Workstation-optional"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-firewall-0:0.4.3.2-8.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional:python-firewall-0:0.4.3.2-8.el7.noarch"
        },
        "product_reference": "python-firewall-0:0.4.3.2-8.el7.noarch",
        "relates_to_product_reference": "7Workstation-optional"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firewall-applet-0:0.4.3.2-8.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation:firewall-applet-0:0.4.3.2-8.el7.noarch"
        },
        "product_reference": "firewall-applet-0:0.4.3.2-8.el7.noarch",
        "relates_to_product_reference": "7Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firewall-config-0:0.4.3.2-8.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation:firewall-config-0:0.4.3.2-8.el7.noarch"
        },
        "product_reference": "firewall-config-0:0.4.3.2-8.el7.noarch",
        "relates_to_product_reference": "7Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firewalld-0:0.4.3.2-8.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation:firewalld-0:0.4.3.2-8.el7.noarch"
        },
        "product_reference": "firewalld-0:0.4.3.2-8.el7.noarch",
        "relates_to_product_reference": "7Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firewalld-0:0.4.3.2-8.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation:firewalld-0:0.4.3.2-8.el7.src"
        },
        "product_reference": "firewalld-0:0.4.3.2-8.el7.src",
        "relates_to_product_reference": "7Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firewalld-filesystem-0:0.4.3.2-8.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation:firewalld-filesystem-0:0.4.3.2-8.el7.noarch"
        },
        "product_reference": "firewalld-filesystem-0:0.4.3.2-8.el7.noarch",
        "relates_to_product_reference": "7Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-firewall-0:0.4.3.2-8.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation:python-firewall-0:0.4.3.2-8.el7.noarch"
        },
        "product_reference": "python-firewall-0:0.4.3.2-8.el7.noarch",
        "relates_to_product_reference": "7Workstation"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2016-5410",
      "cwe": {
        "id": "CWE-306",
        "name": "Missing Authentication for Critical Function"
      },
      "discovery_date": "2016-07-22T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1360135"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the way firewalld allowed certain firewall configurations to be modified by unauthenticated users. Any locally logged in user could use this flaw to tamper or change firewall settings.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "firewalld: Firewall configuration can be modified by any logged in user",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-optional:firewall-applet-0:0.4.3.2-8.el7.noarch",
          "7Client-optional:firewall-config-0:0.4.3.2-8.el7.noarch",
          "7Client-optional:firewalld-0:0.4.3.2-8.el7.noarch",
          "7Client-optional:firewalld-0:0.4.3.2-8.el7.src",
          "7Client-optional:firewalld-filesystem-0:0.4.3.2-8.el7.noarch",
          "7Client-optional:python-firewall-0:0.4.3.2-8.el7.noarch",
          "7Client:firewall-applet-0:0.4.3.2-8.el7.noarch",
          "7Client:firewall-config-0:0.4.3.2-8.el7.noarch",
          "7Client:firewalld-0:0.4.3.2-8.el7.noarch",
          "7Client:firewalld-0:0.4.3.2-8.el7.src",
          "7Client:firewalld-filesystem-0:0.4.3.2-8.el7.noarch",
          "7Client:python-firewall-0:0.4.3.2-8.el7.noarch",
          "7ComputeNode-optional:firewall-applet-0:0.4.3.2-8.el7.noarch",
          "7ComputeNode-optional:firewall-config-0:0.4.3.2-8.el7.noarch",
          "7ComputeNode-optional:firewalld-0:0.4.3.2-8.el7.noarch",
          "7ComputeNode-optional:firewalld-0:0.4.3.2-8.el7.src",
          "7ComputeNode-optional:firewalld-filesystem-0:0.4.3.2-8.el7.noarch",
          "7ComputeNode-optional:python-firewall-0:0.4.3.2-8.el7.noarch",
          "7ComputeNode:firewall-applet-0:0.4.3.2-8.el7.noarch",
          "7ComputeNode:firewall-config-0:0.4.3.2-8.el7.noarch",
          "7ComputeNode:firewalld-0:0.4.3.2-8.el7.noarch",
          "7ComputeNode:firewalld-0:0.4.3.2-8.el7.src",
          "7ComputeNode:firewalld-filesystem-0:0.4.3.2-8.el7.noarch",
          "7ComputeNode:python-firewall-0:0.4.3.2-8.el7.noarch",
          "7Server-optional:firewall-applet-0:0.4.3.2-8.el7.noarch",
          "7Server-optional:firewall-config-0:0.4.3.2-8.el7.noarch",
          "7Server-optional:firewalld-0:0.4.3.2-8.el7.noarch",
          "7Server-optional:firewalld-0:0.4.3.2-8.el7.src",
          "7Server-optional:firewalld-filesystem-0:0.4.3.2-8.el7.noarch",
          "7Server-optional:python-firewall-0:0.4.3.2-8.el7.noarch",
          "7Server:firewall-applet-0:0.4.3.2-8.el7.noarch",
          "7Server:firewall-config-0:0.4.3.2-8.el7.noarch",
          "7Server:firewalld-0:0.4.3.2-8.el7.noarch",
          "7Server:firewalld-0:0.4.3.2-8.el7.src",
          "7Server:firewalld-filesystem-0:0.4.3.2-8.el7.noarch",
          "7Server:python-firewall-0:0.4.3.2-8.el7.noarch",
          "7Workstation-optional:firewall-applet-0:0.4.3.2-8.el7.noarch",
          "7Workstation-optional:firewall-config-0:0.4.3.2-8.el7.noarch",
          "7Workstation-optional:firewalld-0:0.4.3.2-8.el7.noarch",
          "7Workstation-optional:firewalld-0:0.4.3.2-8.el7.src",
          "7Workstation-optional:firewalld-filesystem-0:0.4.3.2-8.el7.noarch",
          "7Workstation-optional:python-firewall-0:0.4.3.2-8.el7.noarch",
          "7Workstation:firewall-applet-0:0.4.3.2-8.el7.noarch",
          "7Workstation:firewall-config-0:0.4.3.2-8.el7.noarch",
          "7Workstation:firewalld-0:0.4.3.2-8.el7.noarch",
          "7Workstation:firewalld-0:0.4.3.2-8.el7.src",
          "7Workstation:firewalld-filesystem-0:0.4.3.2-8.el7.noarch",
          "7Workstation:python-firewall-0:0.4.3.2-8.el7.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2016-5410"
        },
        {
          "category": "external",
          "summary": "RHBZ#1360135",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1360135"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2016-5410",
          "url": "https://www.cve.org/CVERecord?id=CVE-2016-5410"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-5410",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5410"
        }
      ],
      "release_date": "2016-08-16T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2016-11-03T08:11:47+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Client-optional:firewall-applet-0:0.4.3.2-8.el7.noarch",
            "7Client-optional:firewall-config-0:0.4.3.2-8.el7.noarch",
            "7Client-optional:firewalld-0:0.4.3.2-8.el7.noarch",
            "7Client-optional:firewalld-0:0.4.3.2-8.el7.src",
            "7Client-optional:firewalld-filesystem-0:0.4.3.2-8.el7.noarch",
            "7Client-optional:python-firewall-0:0.4.3.2-8.el7.noarch",
            "7Client:firewall-applet-0:0.4.3.2-8.el7.noarch",
            "7Client:firewall-config-0:0.4.3.2-8.el7.noarch",
            "7Client:firewalld-0:0.4.3.2-8.el7.noarch",
            "7Client:firewalld-0:0.4.3.2-8.el7.src",
            "7Client:firewalld-filesystem-0:0.4.3.2-8.el7.noarch",
            "7Client:python-firewall-0:0.4.3.2-8.el7.noarch",
            "7ComputeNode-optional:firewall-applet-0:0.4.3.2-8.el7.noarch",
            "7ComputeNode-optional:firewall-config-0:0.4.3.2-8.el7.noarch",
            "7ComputeNode-optional:firewalld-0:0.4.3.2-8.el7.noarch",
            "7ComputeNode-optional:firewalld-0:0.4.3.2-8.el7.src",
            "7ComputeNode-optional:firewalld-filesystem-0:0.4.3.2-8.el7.noarch",
            "7ComputeNode-optional:python-firewall-0:0.4.3.2-8.el7.noarch",
            "7ComputeNode:firewall-applet-0:0.4.3.2-8.el7.noarch",
            "7ComputeNode:firewall-config-0:0.4.3.2-8.el7.noarch",
            "7ComputeNode:firewalld-0:0.4.3.2-8.el7.noarch",
            "7ComputeNode:firewalld-0:0.4.3.2-8.el7.src",
            "7ComputeNode:firewalld-filesystem-0:0.4.3.2-8.el7.noarch",
            "7ComputeNode:python-firewall-0:0.4.3.2-8.el7.noarch",
            "7Server-optional:firewall-applet-0:0.4.3.2-8.el7.noarch",
            "7Server-optional:firewall-config-0:0.4.3.2-8.el7.noarch",
            "7Server-optional:firewalld-0:0.4.3.2-8.el7.noarch",
            "7Server-optional:firewalld-0:0.4.3.2-8.el7.src",
            "7Server-optional:firewalld-filesystem-0:0.4.3.2-8.el7.noarch",
            "7Server-optional:python-firewall-0:0.4.3.2-8.el7.noarch",
            "7Server:firewall-applet-0:0.4.3.2-8.el7.noarch",
            "7Server:firewall-config-0:0.4.3.2-8.el7.noarch",
            "7Server:firewalld-0:0.4.3.2-8.el7.noarch",
            "7Server:firewalld-0:0.4.3.2-8.el7.src",
            "7Server:firewalld-filesystem-0:0.4.3.2-8.el7.noarch",
            "7Server:python-firewall-0:0.4.3.2-8.el7.noarch",
            "7Workstation-optional:firewall-applet-0:0.4.3.2-8.el7.noarch",
            "7Workstation-optional:firewall-config-0:0.4.3.2-8.el7.noarch",
            "7Workstation-optional:firewalld-0:0.4.3.2-8.el7.noarch",
            "7Workstation-optional:firewalld-0:0.4.3.2-8.el7.src",
            "7Workstation-optional:firewalld-filesystem-0:0.4.3.2-8.el7.noarch",
            "7Workstation-optional:python-firewall-0:0.4.3.2-8.el7.noarch",
            "7Workstation:firewall-applet-0:0.4.3.2-8.el7.noarch",
            "7Workstation:firewall-config-0:0.4.3.2-8.el7.noarch",
            "7Workstation:firewalld-0:0.4.3.2-8.el7.noarch",
            "7Workstation:firewalld-0:0.4.3.2-8.el7.src",
            "7Workstation:firewalld-filesystem-0:0.4.3.2-8.el7.noarch",
            "7Workstation:python-firewall-0:0.4.3.2-8.el7.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2016:2597"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.4,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.0"
          },
          "products": [
            "7Client-optional:firewall-applet-0:0.4.3.2-8.el7.noarch",
            "7Client-optional:firewall-config-0:0.4.3.2-8.el7.noarch",
            "7Client-optional:firewalld-0:0.4.3.2-8.el7.noarch",
            "7Client-optional:firewalld-0:0.4.3.2-8.el7.src",
            "7Client-optional:firewalld-filesystem-0:0.4.3.2-8.el7.noarch",
            "7Client-optional:python-firewall-0:0.4.3.2-8.el7.noarch",
            "7Client:firewall-applet-0:0.4.3.2-8.el7.noarch",
            "7Client:firewall-config-0:0.4.3.2-8.el7.noarch",
            "7Client:firewalld-0:0.4.3.2-8.el7.noarch",
            "7Client:firewalld-0:0.4.3.2-8.el7.src",
            "7Client:firewalld-filesystem-0:0.4.3.2-8.el7.noarch",
            "7Client:python-firewall-0:0.4.3.2-8.el7.noarch",
            "7ComputeNode-optional:firewall-applet-0:0.4.3.2-8.el7.noarch",
            "7ComputeNode-optional:firewall-config-0:0.4.3.2-8.el7.noarch",
            "7ComputeNode-optional:firewalld-0:0.4.3.2-8.el7.noarch",
            "7ComputeNode-optional:firewalld-0:0.4.3.2-8.el7.src",
            "7ComputeNode-optional:firewalld-filesystem-0:0.4.3.2-8.el7.noarch",
            "7ComputeNode-optional:python-firewall-0:0.4.3.2-8.el7.noarch",
            "7ComputeNode:firewall-applet-0:0.4.3.2-8.el7.noarch",
            "7ComputeNode:firewall-config-0:0.4.3.2-8.el7.noarch",
            "7ComputeNode:firewalld-0:0.4.3.2-8.el7.noarch",
            "7ComputeNode:firewalld-0:0.4.3.2-8.el7.src",
            "7ComputeNode:firewalld-filesystem-0:0.4.3.2-8.el7.noarch",
            "7ComputeNode:python-firewall-0:0.4.3.2-8.el7.noarch",
            "7Server-optional:firewall-applet-0:0.4.3.2-8.el7.noarch",
            "7Server-optional:firewall-config-0:0.4.3.2-8.el7.noarch",
            "7Server-optional:firewalld-0:0.4.3.2-8.el7.noarch",
            "7Server-optional:firewalld-0:0.4.3.2-8.el7.src",
            "7Server-optional:firewalld-filesystem-0:0.4.3.2-8.el7.noarch",
            "7Server-optional:python-firewall-0:0.4.3.2-8.el7.noarch",
            "7Server:firewall-applet-0:0.4.3.2-8.el7.noarch",
            "7Server:firewall-config-0:0.4.3.2-8.el7.noarch",
            "7Server:firewalld-0:0.4.3.2-8.el7.noarch",
            "7Server:firewalld-0:0.4.3.2-8.el7.src",
            "7Server:firewalld-filesystem-0:0.4.3.2-8.el7.noarch",
            "7Server:python-firewall-0:0.4.3.2-8.el7.noarch",
            "7Workstation-optional:firewall-applet-0:0.4.3.2-8.el7.noarch",
            "7Workstation-optional:firewall-config-0:0.4.3.2-8.el7.noarch",
            "7Workstation-optional:firewalld-0:0.4.3.2-8.el7.noarch",
            "7Workstation-optional:firewalld-0:0.4.3.2-8.el7.src",
            "7Workstation-optional:firewalld-filesystem-0:0.4.3.2-8.el7.noarch",
            "7Workstation-optional:python-firewall-0:0.4.3.2-8.el7.noarch",
            "7Workstation:firewall-applet-0:0.4.3.2-8.el7.noarch",
            "7Workstation:firewall-config-0:0.4.3.2-8.el7.noarch",
            "7Workstation:firewalld-0:0.4.3.2-8.el7.noarch",
            "7Workstation:firewalld-0:0.4.3.2-8.el7.src",
            "7Workstation:firewalld-filesystem-0:0.4.3.2-8.el7.noarch",
            "7Workstation:python-firewall-0:0.4.3.2-8.el7.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "firewalld: Firewall configuration can be modified by any logged in user"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…