RHSA-2016:2839

Vulnerability from csaf_redhat - Published: 2016-11-30 19:51 - Updated: 2026-02-19 17:40
Summary
Red Hat Security Advisory: CFME 5.6.3 security, bug fix, and enhancement update
Severity
Important
Notes
Topic: An update is now available for Red Hat CloudForms 4.1. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details: Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller (MVC) framework for web application development. Action Pack implements the controller and the view components. Security Fix(es): * A code injection flaw was found in the way capacity and utilization imported control files are processed. A remote, authenticated attacker with access to the capacity and utilization feature could use this flaw to execute arbitrary code as the user CFME runs as. (CVE-2016-5402) This issue was discovered by Simon Lukasik (Red Hat). Additional Changes: This update also fixes various bugs and adds several enhancements. Notable changes include: Changes to the Automate component: * This release of CloudForms allows provisioning of a virtual machine without specifying a host but validating a cluster. CloudForms now validates if either a host or cluster is selected when provisioning on VMware. (BZ#1378116) Changes to the Providers component: * In the previous version of CloudForms, when attempting to open a VNC console to an instance, CloudForms failed to connect because the instance did not exist for that tenant - it attempted to use the wrong tenant. This update specifies the tenant when opening a VNC console which has resolved the issue. CloudForms is now able to connect successfully without an error. (BZ#1370207) Changes to the Provisioning component: * In the previous version of CloudForms, cloning a VMware template failed when the target datacenter was nested below multiple folders. This was because if the datacenter was nested logically under various folders, users were unable to find the placement ID during an autoplacement VMware provision request. This fix always does a lookup of the folder path from the host datacenter instead of statically setting a possible wrong default value which has resolved the issue. (BZ#1361174) Changes to the Replication component: * In the previous version of CloudForms, subscription validation failed for replication subscriptions which were successfully saved. This was because the validation was done directly by the UI which did not have access to passwords of currently saved subscriptions. The validation would pass when the user enters the password when initially saving the subscription, but failed once the subscription needed to be retrieved from the database. This update has fixed the failing validation on saved replication subscriptions. (BZ#1378554) Changes to the vulnerability component: * A code injection flaw was found in the way capacity and utilization imported control files are processed. A remote, authenticated attacker with access to the capacity and utilization feature could use this flaw to execute arbitrary code as the user CFME runs as. (BZ#1357559) * In the previous version of CloudForms, when trying to save filters in Subnets/Routers/Security groups/Floating IPs/Network ports exception appeared. This was caused due to missing routes for network resources. This update adds missing routes for network resources and the issue has now been resolved. (BZ#1370573) * In the previous version of CloudForms, My Filters in datastore was unclickable and no filters were shown under it. This update enabled My Filters in datastore and the issue is now resolved. (BZ#1379727)
Terms of Use: This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

A code injection flaw was found in the way capacity and utilization imported control files are processed. A remote, authenticated attacker with access to the capacity and utilization feature could use this flaw to execute arbitrary code as the user CFME runs as.

CWE-94 - Improper Control of Generation of Code ('Code Injection')
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2016:2839
References
https://access.redhat.com/errata/RHSA-2016:2839 self
https://access.redhat.com/security/updates/classi… external
https://bugzilla.redhat.com/show_bug.cgi?id=1346967 external
https://bugzilla.redhat.com/show_bug.cgi?id=1346969 external
https://bugzilla.redhat.com/show_bug.cgi?id=1347002 external
https://bugzilla.redhat.com/show_bug.cgi?id=1349413 external
https://bugzilla.redhat.com/show_bug.cgi?id=1357559 external
https://bugzilla.redhat.com/show_bug.cgi?id=1358324 external
https://bugzilla.redhat.com/show_bug.cgi?id=1361174 external
https://bugzilla.redhat.com/show_bug.cgi?id=1362632 external
https://bugzilla.redhat.com/show_bug.cgi?id=1368162 external
https://bugzilla.redhat.com/show_bug.cgi?id=1368172 external
https://bugzilla.redhat.com/show_bug.cgi?id=1370207 external
https://bugzilla.redhat.com/show_bug.cgi?id=1370570 external
https://bugzilla.redhat.com/show_bug.cgi?id=1370573 external
https://bugzilla.redhat.com/show_bug.cgi?id=1370576 external
https://bugzilla.redhat.com/show_bug.cgi?id=1372768 external
https://bugzilla.redhat.com/show_bug.cgi?id=1375206 external
https://bugzilla.redhat.com/show_bug.cgi?id=1376145 external
https://bugzilla.redhat.com/show_bug.cgi?id=1376514 external
https://bugzilla.redhat.com/show_bug.cgi?id=1376516 external
https://bugzilla.redhat.com/show_bug.cgi?id=1376519 external
https://bugzilla.redhat.com/show_bug.cgi?id=1376521 external
https://bugzilla.redhat.com/show_bug.cgi?id=1376525 external
https://bugzilla.redhat.com/show_bug.cgi?id=1376526 external
https://bugzilla.redhat.com/show_bug.cgi?id=1377417 external
https://bugzilla.redhat.com/show_bug.cgi?id=1377418 external
https://bugzilla.redhat.com/show_bug.cgi?id=1378116 external
https://bugzilla.redhat.com/show_bug.cgi?id=1378173 external
https://bugzilla.redhat.com/show_bug.cgi?id=1378554 external
https://bugzilla.redhat.com/show_bug.cgi?id=1379692 external
https://bugzilla.redhat.com/show_bug.cgi?id=1379693 external
https://bugzilla.redhat.com/show_bug.cgi?id=1379694 external
https://bugzilla.redhat.com/show_bug.cgi?id=1379697 external
https://bugzilla.redhat.com/show_bug.cgi?id=1379727 external
https://bugzilla.redhat.com/show_bug.cgi?id=1379728 external
https://bugzilla.redhat.com/show_bug.cgi?id=1380107 external
https://bugzilla.redhat.com/show_bug.cgi?id=1380170 external
https://bugzilla.redhat.com/show_bug.cgi?id=1381624 external
https://bugzilla.redhat.com/show_bug.cgi?id=1382072 external
https://bugzilla.redhat.com/show_bug.cgi?id=1382074 external
https://bugzilla.redhat.com/show_bug.cgi?id=1382164 external
https://bugzilla.redhat.com/show_bug.cgi?id=1382406 external
https://bugzilla.redhat.com/show_bug.cgi?id=1382408 external
https://bugzilla.redhat.com/show_bug.cgi?id=1382753 external
https://bugzilla.redhat.com/show_bug.cgi?id=1382819 external
https://bugzilla.redhat.com/show_bug.cgi?id=1382826 external
https://bugzilla.redhat.com/show_bug.cgi?id=1382834 external
https://bugzilla.redhat.com/show_bug.cgi?id=1382835 external
https://bugzilla.redhat.com/show_bug.cgi?id=1382836 external
https://bugzilla.redhat.com/show_bug.cgi?id=1382837 external
https://bugzilla.redhat.com/show_bug.cgi?id=1382846 external
https://bugzilla.redhat.com/show_bug.cgi?id=1382847 external
https://bugzilla.redhat.com/show_bug.cgi?id=1383368 external
https://bugzilla.redhat.com/show_bug.cgi?id=1383466 external
https://bugzilla.redhat.com/show_bug.cgi?id=1383469 external
https://bugzilla.redhat.com/show_bug.cgi?id=1383470 external
https://bugzilla.redhat.com/show_bug.cgi?id=1383497 external
https://bugzilla.redhat.com/show_bug.cgi?id=1385156 external
https://bugzilla.redhat.com/show_bug.cgi?id=1385173 external
https://bugzilla.redhat.com/show_bug.cgi?id=1386792 external
https://bugzilla.redhat.com/show_bug.cgi?id=1386793 external
https://bugzilla.redhat.com/show_bug.cgi?id=1386794 external
https://bugzilla.redhat.com/show_bug.cgi?id=1386797 external
https://bugzilla.redhat.com/show_bug.cgi?id=1388984 external
https://bugzilla.redhat.com/show_bug.cgi?id=1389025 external
https://bugzilla.redhat.com/show_bug.cgi?id=1389760 external
https://bugzilla.redhat.com/show_bug.cgi?id=1389790 external
https://bugzilla.redhat.com/show_bug.cgi?id=1390697 external
https://bugzilla.redhat.com/show_bug.cgi?id=1390698 external
https://bugzilla.redhat.com/show_bug.cgi?id=1390724 external
https://bugzilla.redhat.com/show_bug.cgi?id=1391710 external
https://bugzilla.redhat.com/show_bug.cgi?id=1391721 external
https://bugzilla.redhat.com/show_bug.cgi?id=1391764 external
https://bugzilla.redhat.com/show_bug.cgi?id=1391980 external
https://bugzilla.redhat.com/show_bug.cgi?id=1392561 external
https://bugzilla.redhat.com/show_bug.cgi?id=1392964 external
https://bugzilla.redhat.com/show_bug.cgi?id=1393061 external
https://bugzilla.redhat.com/show_bug.cgi?id=1395305 external
https://bugzilla.redhat.com/show_bug.cgi?id=1396665 external
https://bugzilla.redhat.com/show_bug.cgi?id=1397093 external
https://bugzilla.redhat.com/show_bug.cgi?id=1397095 external
https://bugzilla.redhat.com/show_bug.cgi?id=1397516 external
https://bugzilla.redhat.com/show_bug.cgi?id=1399285 external
https://security.access.redhat.com/data/csaf/v2/a… self
https://access.redhat.com/security/cve/CVE-2016-5402 self
https://bugzilla.redhat.com/show_bug.cgi?id=1357559 external
https://www.cve.org/CVERecord?id=CVE-2016-5402 external
https://nvd.nist.gov/vuln/detail/CVE-2016-5402 external
Acknowledgments
Red Hat Simon Lukasik

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update is now available for Red Hat CloudForms 4.1.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller (MVC) framework for web application development. Action Pack implements the controller and the view components.\n\nSecurity Fix(es):\n\n* A code injection flaw was found in the way capacity and utilization imported control files are processed. A remote, authenticated attacker with access to the capacity and utilization feature could use this flaw to execute arbitrary code as the user CFME runs as. (CVE-2016-5402)\n\nThis issue was discovered by Simon Lukasik (Red Hat).\n\nAdditional Changes:\n\nThis update also fixes various bugs and adds several enhancements. Notable changes include:\n\nChanges to the Automate component:\n\n* This release of CloudForms allows provisioning of a virtual machine without specifying a host but validating a cluster. CloudForms now validates if either a host or cluster is selected when provisioning on VMware. (BZ#1378116)\n\nChanges to the Providers component:\n\n* In the previous version of CloudForms, when attempting to open a VNC console to an instance, CloudForms failed to connect because the instance did not exist for that tenant - it attempted to use the wrong tenant. This update specifies the tenant when opening a VNC console which has resolved the issue. CloudForms is now able to connect successfully without an error. (BZ#1370207)\n\nChanges to the Provisioning component:\n\n* In the previous version of CloudForms, cloning a VMware template failed when the target datacenter was nested below multiple folders. This was because if the datacenter was nested logically under various folders, users were unable to find the placement ID during an autoplacement VMware provision request. This fix always does a lookup of the folder path from the host datacenter instead of statically setting a possible wrong default value which has resolved the issue. (BZ#1361174)\n\nChanges to the Replication component:\n\n* In the previous version of CloudForms, subscription validation failed for replication subscriptions which were successfully saved. This was because the validation was done directly by the UI which did not have access to passwords of currently saved subscriptions. The validation would pass when the user enters the password when initially saving the subscription, but failed once the subscription needed to be retrieved from the database. This update has fixed the failing validation on saved replication subscriptions. (BZ#1378554)\n\nChanges to the vulnerability component:\n\n* A code injection flaw was found in the way capacity and utilization imported control files are processed. A remote, authenticated attacker with access to the capacity and utilization feature could use this flaw to execute arbitrary code as the user CFME runs as. (BZ#1357559)\n\n* In the previous version of CloudForms, when trying to save filters in Subnets/Routers/Security groups/Floating IPs/Network ports exception appeared. This was caused due to missing routes for network resources. This update adds missing routes for network resources and the issue has now been resolved. (BZ#1370573)\n\n* In the previous version of CloudForms, My Filters in datastore was unclickable and no filters were shown under it. This update enabled My Filters in datastore and the issue is now resolved. (BZ#1379727)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2016:2839",
        "url": "https://access.redhat.com/errata/RHSA-2016:2839"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1346967",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1346967"
      },
      {
        "category": "external",
        "summary": "1346969",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1346969"
      },
      {
        "category": "external",
        "summary": "1347002",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1347002"
      },
      {
        "category": "external",
        "summary": "1349413",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1349413"
      },
      {
        "category": "external",
        "summary": "1357559",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1357559"
      },
      {
        "category": "external",
        "summary": "1358324",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358324"
      },
      {
        "category": "external",
        "summary": "1361174",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361174"
      },
      {
        "category": "external",
        "summary": "1362632",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1362632"
      },
      {
        "category": "external",
        "summary": "1368162",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1368162"
      },
      {
        "category": "external",
        "summary": "1368172",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1368172"
      },
      {
        "category": "external",
        "summary": "1370207",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1370207"
      },
      {
        "category": "external",
        "summary": "1370570",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1370570"
      },
      {
        "category": "external",
        "summary": "1370573",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1370573"
      },
      {
        "category": "external",
        "summary": "1370576",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1370576"
      },
      {
        "category": "external",
        "summary": "1372768",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1372768"
      },
      {
        "category": "external",
        "summary": "1375206",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375206"
      },
      {
        "category": "external",
        "summary": "1376145",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376145"
      },
      {
        "category": "external",
        "summary": "1376514",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376514"
      },
      {
        "category": "external",
        "summary": "1376516",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376516"
      },
      {
        "category": "external",
        "summary": "1376519",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376519"
      },
      {
        "category": "external",
        "summary": "1376521",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376521"
      },
      {
        "category": "external",
        "summary": "1376525",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376525"
      },
      {
        "category": "external",
        "summary": "1376526",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376526"
      },
      {
        "category": "external",
        "summary": "1377417",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1377417"
      },
      {
        "category": "external",
        "summary": "1377418",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1377418"
      },
      {
        "category": "external",
        "summary": "1378116",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1378116"
      },
      {
        "category": "external",
        "summary": "1378173",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1378173"
      },
      {
        "category": "external",
        "summary": "1378554",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1378554"
      },
      {
        "category": "external",
        "summary": "1379692",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1379692"
      },
      {
        "category": "external",
        "summary": "1379693",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1379693"
      },
      {
        "category": "external",
        "summary": "1379694",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1379694"
      },
      {
        "category": "external",
        "summary": "1379697",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1379697"
      },
      {
        "category": "external",
        "summary": "1379727",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1379727"
      },
      {
        "category": "external",
        "summary": "1379728",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1379728"
      },
      {
        "category": "external",
        "summary": "1380107",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1380107"
      },
      {
        "category": "external",
        "summary": "1380170",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1380170"
      },
      {
        "category": "external",
        "summary": "1381624",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381624"
      },
      {
        "category": "external",
        "summary": "1382072",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382072"
      },
      {
        "category": "external",
        "summary": "1382074",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382074"
      },
      {
        "category": "external",
        "summary": "1382164",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382164"
      },
      {
        "category": "external",
        "summary": "1382406",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382406"
      },
      {
        "category": "external",
        "summary": "1382408",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382408"
      },
      {
        "category": "external",
        "summary": "1382753",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382753"
      },
      {
        "category": "external",
        "summary": "1382819",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382819"
      },
      {
        "category": "external",
        "summary": "1382826",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382826"
      },
      {
        "category": "external",
        "summary": "1382834",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382834"
      },
      {
        "category": "external",
        "summary": "1382835",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382835"
      },
      {
        "category": "external",
        "summary": "1382836",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382836"
      },
      {
        "category": "external",
        "summary": "1382837",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382837"
      },
      {
        "category": "external",
        "summary": "1382846",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382846"
      },
      {
        "category": "external",
        "summary": "1382847",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382847"
      },
      {
        "category": "external",
        "summary": "1383368",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1383368"
      },
      {
        "category": "external",
        "summary": "1383466",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1383466"
      },
      {
        "category": "external",
        "summary": "1383469",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1383469"
      },
      {
        "category": "external",
        "summary": "1383470",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1383470"
      },
      {
        "category": "external",
        "summary": "1383497",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1383497"
      },
      {
        "category": "external",
        "summary": "1385156",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1385156"
      },
      {
        "category": "external",
        "summary": "1385173",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1385173"
      },
      {
        "category": "external",
        "summary": "1386792",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386792"
      },
      {
        "category": "external",
        "summary": "1386793",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386793"
      },
      {
        "category": "external",
        "summary": "1386794",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386794"
      },
      {
        "category": "external",
        "summary": "1386797",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386797"
      },
      {
        "category": "external",
        "summary": "1388984",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388984"
      },
      {
        "category": "external",
        "summary": "1389025",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1389025"
      },
      {
        "category": "external",
        "summary": "1389760",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1389760"
      },
      {
        "category": "external",
        "summary": "1389790",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1389790"
      },
      {
        "category": "external",
        "summary": "1390697",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1390697"
      },
      {
        "category": "external",
        "summary": "1390698",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1390698"
      },
      {
        "category": "external",
        "summary": "1390724",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1390724"
      },
      {
        "category": "external",
        "summary": "1391710",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1391710"
      },
      {
        "category": "external",
        "summary": "1391721",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1391721"
      },
      {
        "category": "external",
        "summary": "1391764",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1391764"
      },
      {
        "category": "external",
        "summary": "1391980",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1391980"
      },
      {
        "category": "external",
        "summary": "1392561",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1392561"
      },
      {
        "category": "external",
        "summary": "1392964",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1392964"
      },
      {
        "category": "external",
        "summary": "1393061",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1393061"
      },
      {
        "category": "external",
        "summary": "1395305",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1395305"
      },
      {
        "category": "external",
        "summary": "1396665",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1396665"
      },
      {
        "category": "external",
        "summary": "1397093",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397093"
      },
      {
        "category": "external",
        "summary": "1397095",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397095"
      },
      {
        "category": "external",
        "summary": "1397516",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397516"
      },
      {
        "category": "external",
        "summary": "1399285",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1399285"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_2839.json"
      }
    ],
    "title": "Red Hat Security Advisory: CFME 5.6.3 security, bug fix, and enhancement update",
    "tracking": {
      "current_release_date": "2026-02-19T17:40:41+00:00",
      "generator": {
        "date": "2026-02-19T17:40:41+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.7.1"
        }
      },
      "id": "RHSA-2016:2839",
      "initial_release_date": "2016-11-30T19:51:49+00:00",
      "revision_history": [
        {
          "date": "2016-11-30T19:51:49+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2016-11-30T19:51:49+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2026-02-19T17:40:41+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "CloudForms Management Engine 5.6",
                "product": {
                  "name": "CloudForms Management Engine 5.6",
                  "product_id": "7Server-RH7-CFME-5.6",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:cloudforms_managementengine:5.6::el7"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat CloudForms"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "freeipmi-bmc-watchdog-0:1.5.1-2.el7cf.x86_64",
                "product": {
                  "name": "freeipmi-bmc-watchdog-0:1.5.1-2.el7cf.x86_64",
                  "product_id": "freeipmi-bmc-watchdog-0:1.5.1-2.el7cf.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/freeipmi-bmc-watchdog@1.5.1-2.el7cf?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "freeipmi-ipmidetectd-0:1.5.1-2.el7cf.x86_64",
                "product": {
                  "name": "freeipmi-ipmidetectd-0:1.5.1-2.el7cf.x86_64",
                  "product_id": "freeipmi-ipmidetectd-0:1.5.1-2.el7cf.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/freeipmi-ipmidetectd@1.5.1-2.el7cf?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "freeipmi-devel-0:1.5.1-2.el7cf.x86_64",
                "product": {
                  "name": "freeipmi-devel-0:1.5.1-2.el7cf.x86_64",
                  "product_id": "freeipmi-devel-0:1.5.1-2.el7cf.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/freeipmi-devel@1.5.1-2.el7cf?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "freeipmi-ipmiseld-0:1.5.1-2.el7cf.x86_64",
                "product": {
                  "name": "freeipmi-ipmiseld-0:1.5.1-2.el7cf.x86_64",
                  "product_id": "freeipmi-ipmiseld-0:1.5.1-2.el7cf.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/freeipmi-ipmiseld@1.5.1-2.el7cf?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "freeipmi-debuginfo-0:1.5.1-2.el7cf.x86_64",
                "product": {
                  "name": "freeipmi-debuginfo-0:1.5.1-2.el7cf.x86_64",
                  "product_id": "freeipmi-debuginfo-0:1.5.1-2.el7cf.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/freeipmi-debuginfo@1.5.1-2.el7cf?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "freeipmi-0:1.5.1-2.el7cf.x86_64",
                "product": {
                  "name": "freeipmi-0:1.5.1-2.el7cf.x86_64",
                  "product_id": "freeipmi-0:1.5.1-2.el7cf.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/freeipmi@1.5.1-2.el7cf?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "cfme-0:5.6.3.3-1.el7cf.x86_64",
                "product": {
                  "name": "cfme-0:5.6.3.3-1.el7cf.x86_64",
                  "product_id": "cfme-0:5.6.3.3-1.el7cf.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/cfme@5.6.3.3-1.el7cf?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "cfme-debuginfo-0:5.6.3.3-1.el7cf.x86_64",
                "product": {
                  "name": "cfme-debuginfo-0:5.6.3.3-1.el7cf.x86_64",
                  "product_id": "cfme-debuginfo-0:5.6.3.3-1.el7cf.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/cfme-debuginfo@5.6.3.3-1.el7cf?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "cfme-gemset-0:5.6.3.3-1.el7cf.x86_64",
                "product": {
                  "name": "cfme-gemset-0:5.6.3.3-1.el7cf.x86_64",
                  "product_id": "cfme-gemset-0:5.6.3.3-1.el7cf.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/cfme-gemset@5.6.3.3-1.el7cf?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "cfme-appliance-0:5.6.3.3-1.el7cf.x86_64",
                "product": {
                  "name": "cfme-appliance-0:5.6.3.3-1.el7cf.x86_64",
                  "product_id": "cfme-appliance-0:5.6.3.3-1.el7cf.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/cfme-appliance@5.6.3.3-1.el7cf?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "cfme-appliance-debuginfo-0:5.6.3.3-1.el7cf.x86_64",
                "product": {
                  "name": "cfme-appliance-debuginfo-0:5.6.3.3-1.el7cf.x86_64",
                  "product_id": "cfme-appliance-debuginfo-0:5.6.3.3-1.el7cf.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/cfme-appliance-debuginfo@5.6.3.3-1.el7cf?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "freeipmi-0:1.5.1-2.el7cf.src",
                "product": {
                  "name": "freeipmi-0:1.5.1-2.el7cf.src",
                  "product_id": "freeipmi-0:1.5.1-2.el7cf.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/freeipmi@1.5.1-2.el7cf?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "cfme-0:5.6.3.3-1.el7cf.src",
                "product": {
                  "name": "cfme-0:5.6.3.3-1.el7cf.src",
                  "product_id": "cfme-0:5.6.3.3-1.el7cf.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/cfme@5.6.3.3-1.el7cf?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "cfme-gemset-0:5.6.3.3-1.el7cf.src",
                "product": {
                  "name": "cfme-gemset-0:5.6.3.3-1.el7cf.src",
                  "product_id": "cfme-gemset-0:5.6.3.3-1.el7cf.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/cfme-gemset@5.6.3.3-1.el7cf?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "cfme-appliance-0:5.6.3.3-1.el7cf.src",
                "product": {
                  "name": "cfme-appliance-0:5.6.3.3-1.el7cf.src",
                  "product_id": "cfme-appliance-0:5.6.3.3-1.el7cf.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/cfme-appliance@5.6.3.3-1.el7cf?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cfme-0:5.6.3.3-1.el7cf.src as a component of CloudForms Management Engine 5.6",
          "product_id": "7Server-RH7-CFME-5.6:cfme-0:5.6.3.3-1.el7cf.src"
        },
        "product_reference": "cfme-0:5.6.3.3-1.el7cf.src",
        "relates_to_product_reference": "7Server-RH7-CFME-5.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cfme-0:5.6.3.3-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.6",
          "product_id": "7Server-RH7-CFME-5.6:cfme-0:5.6.3.3-1.el7cf.x86_64"
        },
        "product_reference": "cfme-0:5.6.3.3-1.el7cf.x86_64",
        "relates_to_product_reference": "7Server-RH7-CFME-5.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cfme-appliance-0:5.6.3.3-1.el7cf.src as a component of CloudForms Management Engine 5.6",
          "product_id": "7Server-RH7-CFME-5.6:cfme-appliance-0:5.6.3.3-1.el7cf.src"
        },
        "product_reference": "cfme-appliance-0:5.6.3.3-1.el7cf.src",
        "relates_to_product_reference": "7Server-RH7-CFME-5.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cfme-appliance-0:5.6.3.3-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.6",
          "product_id": "7Server-RH7-CFME-5.6:cfme-appliance-0:5.6.3.3-1.el7cf.x86_64"
        },
        "product_reference": "cfme-appliance-0:5.6.3.3-1.el7cf.x86_64",
        "relates_to_product_reference": "7Server-RH7-CFME-5.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cfme-appliance-debuginfo-0:5.6.3.3-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.6",
          "product_id": "7Server-RH7-CFME-5.6:cfme-appliance-debuginfo-0:5.6.3.3-1.el7cf.x86_64"
        },
        "product_reference": "cfme-appliance-debuginfo-0:5.6.3.3-1.el7cf.x86_64",
        "relates_to_product_reference": "7Server-RH7-CFME-5.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cfme-debuginfo-0:5.6.3.3-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.6",
          "product_id": "7Server-RH7-CFME-5.6:cfme-debuginfo-0:5.6.3.3-1.el7cf.x86_64"
        },
        "product_reference": "cfme-debuginfo-0:5.6.3.3-1.el7cf.x86_64",
        "relates_to_product_reference": "7Server-RH7-CFME-5.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cfme-gemset-0:5.6.3.3-1.el7cf.src as a component of CloudForms Management Engine 5.6",
          "product_id": "7Server-RH7-CFME-5.6:cfme-gemset-0:5.6.3.3-1.el7cf.src"
        },
        "product_reference": "cfme-gemset-0:5.6.3.3-1.el7cf.src",
        "relates_to_product_reference": "7Server-RH7-CFME-5.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cfme-gemset-0:5.6.3.3-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.6",
          "product_id": "7Server-RH7-CFME-5.6:cfme-gemset-0:5.6.3.3-1.el7cf.x86_64"
        },
        "product_reference": "cfme-gemset-0:5.6.3.3-1.el7cf.x86_64",
        "relates_to_product_reference": "7Server-RH7-CFME-5.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "freeipmi-0:1.5.1-2.el7cf.src as a component of CloudForms Management Engine 5.6",
          "product_id": "7Server-RH7-CFME-5.6:freeipmi-0:1.5.1-2.el7cf.src"
        },
        "product_reference": "freeipmi-0:1.5.1-2.el7cf.src",
        "relates_to_product_reference": "7Server-RH7-CFME-5.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "freeipmi-0:1.5.1-2.el7cf.x86_64 as a component of CloudForms Management Engine 5.6",
          "product_id": "7Server-RH7-CFME-5.6:freeipmi-0:1.5.1-2.el7cf.x86_64"
        },
        "product_reference": "freeipmi-0:1.5.1-2.el7cf.x86_64",
        "relates_to_product_reference": "7Server-RH7-CFME-5.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "freeipmi-bmc-watchdog-0:1.5.1-2.el7cf.x86_64 as a component of CloudForms Management Engine 5.6",
          "product_id": "7Server-RH7-CFME-5.6:freeipmi-bmc-watchdog-0:1.5.1-2.el7cf.x86_64"
        },
        "product_reference": "freeipmi-bmc-watchdog-0:1.5.1-2.el7cf.x86_64",
        "relates_to_product_reference": "7Server-RH7-CFME-5.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "freeipmi-debuginfo-0:1.5.1-2.el7cf.x86_64 as a component of CloudForms Management Engine 5.6",
          "product_id": "7Server-RH7-CFME-5.6:freeipmi-debuginfo-0:1.5.1-2.el7cf.x86_64"
        },
        "product_reference": "freeipmi-debuginfo-0:1.5.1-2.el7cf.x86_64",
        "relates_to_product_reference": "7Server-RH7-CFME-5.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "freeipmi-devel-0:1.5.1-2.el7cf.x86_64 as a component of CloudForms Management Engine 5.6",
          "product_id": "7Server-RH7-CFME-5.6:freeipmi-devel-0:1.5.1-2.el7cf.x86_64"
        },
        "product_reference": "freeipmi-devel-0:1.5.1-2.el7cf.x86_64",
        "relates_to_product_reference": "7Server-RH7-CFME-5.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "freeipmi-ipmidetectd-0:1.5.1-2.el7cf.x86_64 as a component of CloudForms Management Engine 5.6",
          "product_id": "7Server-RH7-CFME-5.6:freeipmi-ipmidetectd-0:1.5.1-2.el7cf.x86_64"
        },
        "product_reference": "freeipmi-ipmidetectd-0:1.5.1-2.el7cf.x86_64",
        "relates_to_product_reference": "7Server-RH7-CFME-5.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "freeipmi-ipmiseld-0:1.5.1-2.el7cf.x86_64 as a component of CloudForms Management Engine 5.6",
          "product_id": "7Server-RH7-CFME-5.6:freeipmi-ipmiseld-0:1.5.1-2.el7cf.x86_64"
        },
        "product_reference": "freeipmi-ipmiseld-0:1.5.1-2.el7cf.x86_64",
        "relates_to_product_reference": "7Server-RH7-CFME-5.6"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Simon Lukasik"
          ],
          "organization": "Red Hat",
          "summary": "This issue was discovered by Red Hat."
        }
      ],
      "cve": "CVE-2016-5402",
      "cwe": {
        "id": "CWE-94",
        "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
      },
      "discovery_date": "2016-07-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1357559"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A code injection flaw was found in the way capacity and utilization imported control files are processed. A remote, authenticated attacker with access to the capacity and utilization feature could use this flaw to execute arbitrary code as the user CFME runs as.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "cfme: RCE via Capacity \u0026 Utilization feature",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-RH7-CFME-5.6:cfme-0:5.6.3.3-1.el7cf.src",
          "7Server-RH7-CFME-5.6:cfme-0:5.6.3.3-1.el7cf.x86_64",
          "7Server-RH7-CFME-5.6:cfme-appliance-0:5.6.3.3-1.el7cf.src",
          "7Server-RH7-CFME-5.6:cfme-appliance-0:5.6.3.3-1.el7cf.x86_64",
          "7Server-RH7-CFME-5.6:cfme-appliance-debuginfo-0:5.6.3.3-1.el7cf.x86_64",
          "7Server-RH7-CFME-5.6:cfme-debuginfo-0:5.6.3.3-1.el7cf.x86_64",
          "7Server-RH7-CFME-5.6:cfme-gemset-0:5.6.3.3-1.el7cf.src",
          "7Server-RH7-CFME-5.6:cfme-gemset-0:5.6.3.3-1.el7cf.x86_64",
          "7Server-RH7-CFME-5.6:freeipmi-0:1.5.1-2.el7cf.src",
          "7Server-RH7-CFME-5.6:freeipmi-0:1.5.1-2.el7cf.x86_64",
          "7Server-RH7-CFME-5.6:freeipmi-bmc-watchdog-0:1.5.1-2.el7cf.x86_64",
          "7Server-RH7-CFME-5.6:freeipmi-debuginfo-0:1.5.1-2.el7cf.x86_64",
          "7Server-RH7-CFME-5.6:freeipmi-devel-0:1.5.1-2.el7cf.x86_64",
          "7Server-RH7-CFME-5.6:freeipmi-ipmidetectd-0:1.5.1-2.el7cf.x86_64",
          "7Server-RH7-CFME-5.6:freeipmi-ipmiseld-0:1.5.1-2.el7cf.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2016-5402"
        },
        {
          "category": "external",
          "summary": "RHBZ#1357559",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1357559"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2016-5402",
          "url": "https://www.cve.org/CVERecord?id=CVE-2016-5402"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-5402",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5402"
        }
      ],
      "release_date": "2016-11-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2016-11-30T19:51:49+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-RH7-CFME-5.6:cfme-0:5.6.3.3-1.el7cf.src",
            "7Server-RH7-CFME-5.6:cfme-0:5.6.3.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.6:cfme-appliance-0:5.6.3.3-1.el7cf.src",
            "7Server-RH7-CFME-5.6:cfme-appliance-0:5.6.3.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.6:cfme-appliance-debuginfo-0:5.6.3.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.6:cfme-debuginfo-0:5.6.3.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.6:cfme-gemset-0:5.6.3.3-1.el7cf.src",
            "7Server-RH7-CFME-5.6:cfme-gemset-0:5.6.3.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.6:freeipmi-0:1.5.1-2.el7cf.src",
            "7Server-RH7-CFME-5.6:freeipmi-0:1.5.1-2.el7cf.x86_64",
            "7Server-RH7-CFME-5.6:freeipmi-bmc-watchdog-0:1.5.1-2.el7cf.x86_64",
            "7Server-RH7-CFME-5.6:freeipmi-debuginfo-0:1.5.1-2.el7cf.x86_64",
            "7Server-RH7-CFME-5.6:freeipmi-devel-0:1.5.1-2.el7cf.x86_64",
            "7Server-RH7-CFME-5.6:freeipmi-ipmidetectd-0:1.5.1-2.el7cf.x86_64",
            "7Server-RH7-CFME-5.6:freeipmi-ipmiseld-0:1.5.1-2.el7cf.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2016:2839"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 8.5,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "7Server-RH7-CFME-5.6:cfme-0:5.6.3.3-1.el7cf.src",
            "7Server-RH7-CFME-5.6:cfme-0:5.6.3.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.6:cfme-appliance-0:5.6.3.3-1.el7cf.src",
            "7Server-RH7-CFME-5.6:cfme-appliance-0:5.6.3.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.6:cfme-appliance-debuginfo-0:5.6.3.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.6:cfme-debuginfo-0:5.6.3.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.6:cfme-gemset-0:5.6.3.3-1.el7cf.src",
            "7Server-RH7-CFME-5.6:cfme-gemset-0:5.6.3.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.6:freeipmi-0:1.5.1-2.el7cf.src",
            "7Server-RH7-CFME-5.6:freeipmi-0:1.5.1-2.el7cf.x86_64",
            "7Server-RH7-CFME-5.6:freeipmi-bmc-watchdog-0:1.5.1-2.el7cf.x86_64",
            "7Server-RH7-CFME-5.6:freeipmi-debuginfo-0:1.5.1-2.el7cf.x86_64",
            "7Server-RH7-CFME-5.6:freeipmi-devel-0:1.5.1-2.el7cf.x86_64",
            "7Server-RH7-CFME-5.6:freeipmi-ipmidetectd-0:1.5.1-2.el7cf.x86_64",
            "7Server-RH7-CFME-5.6:freeipmi-ipmiseld-0:1.5.1-2.el7cf.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "cfme: RCE via Capacity \u0026 Utilization feature"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…