ID REDHAT-RHSA-2016-2614.NASL Type nessus Reporter This script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof. Modified 2019-11-02T00:00:00
Description
An update for pacemaker is now available for Red Hat Enterprise Linux
7.
Red Hat Product Security has rated this update as having a security
impact of Important. A Common Vulnerability Scoring System (CVSS) base
score, which gives a detailed severity rating, is available for each
vulnerability from the CVE link(s) in the References section.
The Pacemaker cluster resource manager is a collection of technologies
working together to provide data integrity and the ability to maintain
application availability in the event of a failure.
Security Fix(es) :
An authorization flaw was found in Pacemaker, where it did not
properly guard its IPC interface. An attacker with an unprivileged
account on a Pacemaker node could use this flaw to, for example, force
the Local Resource Manager daemon to execute a script as root and
thereby gain root access on the machine. (CVE-2016-7035)
This issue was discovered by Jan
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Red Hat Security Advisory RHSA-2016:2614. The text
# itself is copyright (C) Red Hat, Inc.
#
include("compat.inc");
if (description)
{
script_id(94604);
script_version("2.10");
script_cvs_date("Date: 2019/10/24 15:35:42");
script_cve_id("CVE-2016-7035");
script_xref(name:"RHSA", value:"2016:2614");
script_name(english:"RHEL 7 : pacemaker (RHSA-2016:2614)");
script_summary(english:"Checks the rpm output for the updated packages");
script_set_attribute(
attribute:"synopsis",
value:"The remote Red Hat host is missing one or more security updates."
);
script_set_attribute(
attribute:"description",
value:
"An update for pacemaker is now available for Red Hat Enterprise Linux
7.
Red Hat Product Security has rated this update as having a security
impact of Important. A Common Vulnerability Scoring System (CVSS) base
score, which gives a detailed severity rating, is available for each
vulnerability from the CVE link(s) in the References section.
The Pacemaker cluster resource manager is a collection of technologies
working together to provide data integrity and the ability to maintain
application availability in the event of a failure.
Security Fix(es) :
* An authorization flaw was found in Pacemaker, where it did not
properly guard its IPC interface. An attacker with an unprivileged
account on a Pacemaker node could use this flaw to, for example, force
the Local Resource Manager daemon to execute a script as root and
thereby gain root access on the machine. (CVE-2016-7035)
This issue was discovered by Jan 'poki' Pokorny (Red Hat) and Alain
Moulle (ATOS/BULL).
Bug Fix(es) :
* The version of Pacemaker in Red Hat Enterprise Linux 7.3
incorporated an increase in the version number of the remote node
protocol. Consequently, cluster nodes running Pacemaker in Red Hat
Enterprise Linux 7.3 and remote nodes running earlier versions of Red
Hat Enterprise Linux were not able to communicate with each other
unless special precautions were taken. This update preserves the
rolling upgrade capability. (BZ#1389023)"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/errata/RHSA-2016:2614"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2016-7035"
);
script_set_attribute(attribute:"solution", value:"Update the affected packages.");
script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:pacemaker");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:pacemaker-cli");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:pacemaker-cluster-libs");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:pacemaker-cts");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:pacemaker-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:pacemaker-doc");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:pacemaker-libs");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:pacemaker-libs-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:pacemaker-nagios-plugins-metadata");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:pacemaker-remote");
script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:7");
script_set_attribute(attribute:"vuln_publication_date", value:"2018/09/10");
script_set_attribute(attribute:"patch_publication_date", value:"2016/11/03");
script_set_attribute(attribute:"plugin_publication_date", value:"2016/11/07");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"Red Hat Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || "Red Hat" >!< release) audit(AUDIT_OS_NOT, "Red Hat");
os_ver = pregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Red Hat");
os_ver = os_ver[1];
if (! preg(pattern:"^7([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Red Hat 7.x", "Red Hat " + os_ver);
if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "s390" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Red Hat", cpu);
yum_updateinfo = get_kb_item("Host/RedHat/yum-updateinfo");
if (!empty_or_null(yum_updateinfo))
{
rhsa = "RHSA-2016:2614";
yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);
if (!empty_or_null(yum_report))
{
security_report_v4(
port : 0,
severity : SECURITY_HOLE,
extra : yum_report
);
exit(0);
}
else
{
audit_message = "affected by Red Hat security advisory " + rhsa;
audit(AUDIT_OS_NOT, audit_message);
}
}
else
{
flag = 0;
if (rpm_check(release:"RHEL7", cpu:"s390x", reference:"pacemaker-1.1.15-11.el7_3.2")) flag++;
if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"pacemaker-1.1.15-11.el7_3.2")) flag++;
if (rpm_check(release:"RHEL7", cpu:"s390x", reference:"pacemaker-cli-1.1.15-11.el7_3.2")) flag++;
if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"pacemaker-cli-1.1.15-11.el7_3.2")) flag++;
if (rpm_check(release:"RHEL7", cpu:"i686", reference:"pacemaker-cluster-libs-1.1.15-11.el7_3.2")) flag++;
if (rpm_check(release:"RHEL7", cpu:"s390x", reference:"pacemaker-cluster-libs-1.1.15-11.el7_3.2")) flag++;
if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"pacemaker-cluster-libs-1.1.15-11.el7_3.2")) flag++;
if (rpm_check(release:"RHEL7", cpu:"s390x", reference:"pacemaker-cts-1.1.15-11.el7_3.2")) flag++;
if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"pacemaker-cts-1.1.15-11.el7_3.2")) flag++;
if (rpm_check(release:"RHEL7", cpu:"i686", reference:"pacemaker-debuginfo-1.1.15-11.el7_3.2")) flag++;
if (rpm_check(release:"RHEL7", cpu:"s390x", reference:"pacemaker-debuginfo-1.1.15-11.el7_3.2")) flag++;
if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"pacemaker-debuginfo-1.1.15-11.el7_3.2")) flag++;
if (rpm_check(release:"RHEL7", cpu:"s390x", reference:"pacemaker-doc-1.1.15-11.el7_3.2")) flag++;
if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"pacemaker-doc-1.1.15-11.el7_3.2")) flag++;
if (rpm_check(release:"RHEL7", cpu:"i686", reference:"pacemaker-libs-1.1.15-11.el7_3.2")) flag++;
if (rpm_check(release:"RHEL7", cpu:"s390x", reference:"pacemaker-libs-1.1.15-11.el7_3.2")) flag++;
if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"pacemaker-libs-1.1.15-11.el7_3.2")) flag++;
if (rpm_check(release:"RHEL7", cpu:"i686", reference:"pacemaker-libs-devel-1.1.15-11.el7_3.2")) flag++;
if (rpm_check(release:"RHEL7", cpu:"s390x", reference:"pacemaker-libs-devel-1.1.15-11.el7_3.2")) flag++;
if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"pacemaker-libs-devel-1.1.15-11.el7_3.2")) flag++;
if (rpm_check(release:"RHEL7", cpu:"s390x", reference:"pacemaker-nagios-plugins-metadata-1.1.15-11.el7_3.2")) flag++;
if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"pacemaker-nagios-plugins-metadata-1.1.15-11.el7_3.2")) flag++;
if (rpm_check(release:"RHEL7", cpu:"s390x", reference:"pacemaker-remote-1.1.15-11.el7_3.2")) flag++;
if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"pacemaker-remote-1.1.15-11.el7_3.2")) flag++;
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_HOLE,
extra : rpm_report_get() + redhat_report_package_caveat()
);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "pacemaker / pacemaker-cli / pacemaker-cluster-libs / pacemaker-cts / etc");
}
}
{"id": "REDHAT-RHSA-2016-2614.NASL", "bulletinFamily": "scanner", "title": "RHEL 7 : pacemaker (RHSA-2016:2614)", "description": "An update for pacemaker is now available for Red Hat Enterprise Linux\n7.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Important. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nThe Pacemaker cluster resource manager is a collection of technologies\nworking together to provide data integrity and the ability to maintain\napplication availability in the event of a failure.\n\nSecurity Fix(es) :\n\n* An authorization flaw was found in Pacemaker, where it did not\nproperly guard its IPC interface. An attacker with an unprivileged\naccount on a Pacemaker node could use this flaw to, for example, force\nthe Local Resource Manager daemon to execute a script as root and\nthereby gain root access on the machine. (CVE-2016-7035)\n\nThis issue was discovered by Jan ", "published": "2016-11-07T00:00:00", "modified": "2019-11-02T00:00:00", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}, "href": "https://www.tenable.com/plugins/nessus/94604", "reporter": "This script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.", "references": ["https://access.redhat.com/errata/RHSA-2016:2614", "https://access.redhat.com/security/cve/cve-2016-7035"], "cvelist": ["CVE-2016-7035"], "type": "nessus", "lastseen": "2019-11-01T03:21:15", "history": [{"bulletin": {"bulletinFamily": "scanner", "cpe": ["p-cpe:/a:redhat:enterprise_linux:pacemaker-nagios-plugins-metadata", "p-cpe:/a:redhat:enterprise_linux:pacemaker", "p-cpe:/a:redhat:enterprise_linux:pacemaker-cli", "cpe:/o:redhat:enterprise_linux:7", "p-cpe:/a:redhat:enterprise_linux:pacemaker-libs-devel", "p-cpe:/a:redhat:enterprise_linux:pacemaker-debuginfo", "p-cpe:/a:redhat:enterprise_linux:pacemaker-doc", "p-cpe:/a:redhat:enterprise_linux:pacemaker-remote", "p-cpe:/a:redhat:enterprise_linux:pacemaker-libs", "p-cpe:/a:redhat:enterprise_linux:pacemaker-cts", "p-cpe:/a:redhat:enterprise_linux:pacemaker-cluster-libs"], "cvelist": ["CVE-2016-7035"], "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}, "description": "An update for pacemaker is now available for Red Hat Enterprise Linux\n7.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Important. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nThe Pacemaker cluster resource manager is a collection of technologies\nworking together to provide data integrity and the ability to maintain\napplication availability in the event of a failure.\n\nSecurity Fix(es) :\n\n* An authorization flaw was found in Pacemaker, where it did not\nproperly guard its IPC interface. An attacker with an unprivileged\naccount on a Pacemaker node could use this flaw to, for example, force\nthe Local Resource Manager daemon to execute a script as root and\nthereby gain root access on the machine. (CVE-2016-7035)\n\nThis issue was discovered by Jan ", "edition": 12, "enchantments": {"dependencies": {"modified": "2019-10-28T21:08:35", "references": [{"idList": ["CESA-2016:2614", "CESA-2016:2675"], "type": "centos"}, {"idList": ["OPENSUSE-SU-2016:2965-1", "SUSE-SU-2016:2869-1"], "type": "suse"}, {"idList": ["CVE-2016-7035"], "type": "cve"}, {"idList": ["OPENVAS:1361412562310810175", "OPENVAS:1361412562310872033", "OPENVAS:1361412562310810188", "OPENVAS:1361412562310882590", "OPENVAS:1361412562310843346", "OPENVAS:1361412562310851502"], "type": "openvas"}, {"idList": ["FEDORA_2016-242FF9A2FA.NASL", "OPENSUSE-2016-1447.NASL", "SL_20161108_PACEMAKER_ON_SL6_X.NASL", "FEDORA_2016-C1CBCC4528.NASL", "REDHAT-RHSA-2016-2675.NASL", "SL_20161103_PACEMAKER_ON_SL7_X.NASL", "CENTOS_RHSA-2016-2675.NASL", "FEDORA_2016-2A159EF513.NASL", "OPENSUSE-2016-1376.NASL", "CENTOS_RHSA-2016-2614.NASL"], "type": "nessus"}, {"idList": ["RHSA-2016:2675", "RHSA-2016:2614"], "type": "redhat"}, {"idList": ["GLSA-201710-08"], "type": "gentoo"}, {"idList": ["USN-3462-1"], "type": "ubuntu"}]}, "score": {"modified": "2019-10-28T21:08:35", "value": 7.2, "vector": "NONE"}}, "hash": "cf0b71e37da54755fdf36bae41d2156ff4d80bdca9b57533a6229478b7f2b208", "hashmap": [{"hash": "ca1edd2aaa7afc2aa7f795747410a457", "key": "references"}, {"hash": "2a270e0fc2ecc2b4dd229fa1eeede16f", "key": "description"}, {"hash": "a7ccf18e2c39956b395d903de76d2a66", "key": "title"}, {"hash": "529a70b67716eba87087ca22d8762127", "key": "href"}, {"hash": "f933fd280f290ef4f2e234bca87292b6", "key": "pluginID"}, {"hash": "a9f39e265a7e23b149ed8353722ba49b", "key": "published"}, {"hash": "9b23e8684dde88b793779b4aaede0947", "key": "cvelist"}, {"hash": "21a312809270e08ac10c76f85c9e38be", "key": "sourceData"}, {"hash": "b7beaf9d124542f914ef08e608facdab", "key": "reporter"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "0bafb6325bcaf483a25404f785191cc5", "key": "modified"}, {"hash": "f032361abd001ada1fdd9acc841b5569", "key": "cpe"}, {"hash": "b46559ea68ec9a13474c3a7776817cfd", "key": "naslFamily"}, {"hash": "f74481c4d3fb2a622ac8c8a438ded811", "key": "cvss"}], "history": [], "href": "https://www.tenable.com/plugins/nessus/94604", "id": "REDHAT-RHSA-2016-2614.NASL", "lastseen": "2019-10-28T21:08:35", "modified": "2019-10-02T00:00:00", "naslFamily": "Red Hat Local Security Checks", "objectVersion": "1.3", "pluginID": "94604", "published": "2016-11-07T00:00:00", "references": ["https://access.redhat.com/errata/RHSA-2016:2614", "https://access.redhat.com/security/cve/cve-2016-7035"], "reporter": "This script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2016:2614. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(94604);\n script_version(\"2.10\");\n script_cvs_date(\"Date: 2019/10/24 15:35:42\");\n\n script_cve_id(\"CVE-2016-7035\");\n script_xref(name:\"RHSA\", value:\"2016:2614\");\n\n script_name(english:\"RHEL 7 : pacemaker (RHSA-2016:2614)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An update for pacemaker is now available for Red Hat Enterprise Linux\n7.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Important. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nThe Pacemaker cluster resource manager is a collection of technologies\nworking together to provide data integrity and the ability to maintain\napplication availability in the event of a failure.\n\nSecurity Fix(es) :\n\n* An authorization flaw was found in Pacemaker, where it did not\nproperly guard its IPC interface. An attacker with an unprivileged\naccount on a Pacemaker node could use this flaw to, for example, force\nthe Local Resource Manager daemon to execute a script as root and\nthereby gain root access on the machine. (CVE-2016-7035)\n\nThis issue was discovered by Jan 'poki' Pokorny (Red Hat) and Alain\nMoulle (ATOS/BULL).\n\nBug Fix(es) :\n\n* The version of Pacemaker in Red Hat Enterprise Linux 7.3\nincorporated an increase in the version number of the remote node\nprotocol. Consequently, cluster nodes running Pacemaker in Red Hat\nEnterprise Linux 7.3 and remote nodes running earlier versions of Red\nHat Enterprise Linux were not able to communicate with each other\nunless special precautions were taken. This update preserves the\nrolling upgrade capability. (BZ#1389023)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2016:2614\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2016-7035\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker-cli\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker-cluster-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker-cts\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker-libs-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker-nagios-plugins-metadata\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker-remote\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/09/10\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/11/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/11/07\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^7([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 7.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2016:2614\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"pacemaker-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"pacemaker-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"pacemaker-cli-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"pacemaker-cli-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"i686\", reference:\"pacemaker-cluster-libs-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"pacemaker-cluster-libs-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"pacemaker-cluster-libs-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"pacemaker-cts-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"pacemaker-cts-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"i686\", reference:\"pacemaker-debuginfo-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"pacemaker-debuginfo-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"pacemaker-debuginfo-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"pacemaker-doc-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"pacemaker-doc-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"i686\", reference:\"pacemaker-libs-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"pacemaker-libs-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"pacemaker-libs-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"i686\", reference:\"pacemaker-libs-devel-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"pacemaker-libs-devel-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"pacemaker-libs-devel-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"pacemaker-nagios-plugins-metadata-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"pacemaker-nagios-plugins-metadata-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"pacemaker-remote-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"pacemaker-remote-1.1.15-11.el7_3.2\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"pacemaker / pacemaker-cli / pacemaker-cluster-libs / pacemaker-cts / etc\");\n }\n}\n", "title": "RHEL 7 : pacemaker (RHSA-2016:2614)", "type": "nessus", "viewCount": 4}, "differentElements": ["modified"], "edition": 12, "lastseen": "2019-10-28T21:08:35"}, {"bulletin": {"bulletinFamily": "scanner", "cpe": ["p-cpe:/a:redhat:enterprise_linux:pacemaker-nagios-plugins-metadata", "p-cpe:/a:redhat:enterprise_linux:pacemaker", "p-cpe:/a:redhat:enterprise_linux:pacemaker-cli", "cpe:/o:redhat:enterprise_linux:7", "p-cpe:/a:redhat:enterprise_linux:pacemaker-libs-devel", "p-cpe:/a:redhat:enterprise_linux:pacemaker-debuginfo", "p-cpe:/a:redhat:enterprise_linux:pacemaker-doc", "p-cpe:/a:redhat:enterprise_linux:pacemaker-remote", "p-cpe:/a:redhat:enterprise_linux:pacemaker-libs", "p-cpe:/a:redhat:enterprise_linux:pacemaker-cts", "p-cpe:/a:redhat:enterprise_linux:pacemaker-cluster-libs"], "cvelist": ["CVE-2016-7035"], "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "description": "An update for pacemaker is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.\n\nThe Pacemaker cluster resource manager is a collection of technologies working together to provide data integrity and the ability to maintain application availability in the event of a failure.\n\nSecurity Fix(es) :\n\n* An authorization flaw was found in Pacemaker, where it did not properly guard its IPC interface. An attacker with an unprivileged account on a Pacemaker node could use this flaw to, for example, force the Local Resource Manager daemon to execute a script as root and thereby gain root access on the machine. (CVE-2016-7035)\n\nThis issue was discovered by Jan 'poki' Pokorny (Red Hat) and Alain Moulle (ATOS/BULL).\n\nBug Fix(es) :\n\n* The version of Pacemaker in Red Hat Enterprise Linux 7.3 incorporated an increase in the version number of the remote node protocol. Consequently, cluster nodes running Pacemaker in Red Hat Enterprise Linux 7.3 and remote nodes running earlier versions of Red Hat Enterprise Linux were not able to communicate with each other unless special precautions were taken. This update preserves the rolling upgrade capability. (BZ#1389023)", "edition": 9, "enchantments": {"score": {"value": 7.2, "vector": "NONE"}}, "hash": "b894bdb61d9b3e38a2e9f95520622a15f2f2e8cc6c5c1bfc742a62022e02bade", "hashmap": [{"hash": "ca1edd2aaa7afc2aa7f795747410a457", "key": "references"}, {"hash": "a7ccf18e2c39956b395d903de76d2a66", "key": "title"}, {"hash": "cfd16da9581e0c21db590e40dfd9e493", "key": "cvss"}, {"hash": "8a0a2e79ca9788ec33d7f0b2f2bdaa1c", "key": "href"}, {"hash": "9cf00d658b687f030ebe173a0528c567", "key": "reporter"}, {"hash": "c5b884973d4e4cb35354348bbaf5ded8", "key": "description"}, {"hash": "f933fd280f290ef4f2e234bca87292b6", "key": "pluginID"}, {"hash": "a9f39e265a7e23b149ed8353722ba49b", "key": "published"}, {"hash": "9b23e8684dde88b793779b4aaede0947", "key": "cvelist"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "f032361abd001ada1fdd9acc841b5569", "key": "cpe"}, {"hash": "de6c54194cb6f640b1e75f710a6f9167", "key": "modified"}, {"hash": "b46559ea68ec9a13474c3a7776817cfd", "key": "naslFamily"}, {"hash": "1a0bce048027b1e57fafbab858643492", "key": "sourceData"}], "history": [], "href": "https://www.tenable.com/plugins/index.php?view=single&id=94604", "id": "REDHAT-RHSA-2016-2614.NASL", "lastseen": "2019-01-09T04:11:20", "modified": "2019-01-08T00:00:00", "naslFamily": "Red Hat Local Security Checks", "objectVersion": "1.3", "pluginID": "94604", "published": "2016-11-07T00:00:00", "references": ["https://access.redhat.com/errata/RHSA-2016:2614", "https://access.redhat.com/security/cve/cve-2016-7035"], "reporter": "Tenable", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2016:2614. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(94604);\n script_version(\"2.7\");\n script_cvs_date(\"Date: 2019/01/08 11:01:15\");\n\n script_cve_id(\"CVE-2016-7035\");\n script_xref(name:\"RHSA\", value:\"2016:2614\");\n\n script_name(english:\"RHEL 7 : pacemaker (RHSA-2016:2614)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An update for pacemaker is now available for Red Hat Enterprise Linux\n7.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Important. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nThe Pacemaker cluster resource manager is a collection of technologies\nworking together to provide data integrity and the ability to maintain\napplication availability in the event of a failure.\n\nSecurity Fix(es) :\n\n* An authorization flaw was found in Pacemaker, where it did not\nproperly guard its IPC interface. An attacker with an unprivileged\naccount on a Pacemaker node could use this flaw to, for example, force\nthe Local Resource Manager daemon to execute a script as root and\nthereby gain root access on the machine. (CVE-2016-7035)\n\nThis issue was discovered by Jan 'poki' Pokorny (Red Hat) and Alain\nMoulle (ATOS/BULL).\n\nBug Fix(es) :\n\n* The version of Pacemaker in Red Hat Enterprise Linux 7.3\nincorporated an increase in the version number of the remote node\nprotocol. Consequently, cluster nodes running Pacemaker in Red Hat\nEnterprise Linux 7.3 and remote nodes running earlier versions of Red\nHat Enterprise Linux were not able to communicate with each other\nunless special precautions were taken. This update preserves the\nrolling upgrade capability. (BZ#1389023)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2016:2614\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2016-7035\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker-cli\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker-cluster-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker-cts\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker-libs-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker-nagios-plugins-metadata\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker-remote\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/11/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/11/07\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = eregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^7([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 7.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2016:2614\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"pacemaker-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"pacemaker-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"pacemaker-cli-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"pacemaker-cli-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"i686\", reference:\"pacemaker-cluster-libs-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"pacemaker-cluster-libs-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"pacemaker-cluster-libs-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"pacemaker-cts-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"pacemaker-cts-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"i686\", reference:\"pacemaker-debuginfo-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"pacemaker-debuginfo-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"pacemaker-debuginfo-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"pacemaker-doc-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"pacemaker-doc-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"i686\", reference:\"pacemaker-libs-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"pacemaker-libs-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"pacemaker-libs-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"i686\", reference:\"pacemaker-libs-devel-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"pacemaker-libs-devel-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"pacemaker-libs-devel-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"pacemaker-nagios-plugins-metadata-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"pacemaker-nagios-plugins-metadata-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"pacemaker-remote-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"pacemaker-remote-1.1.15-11.el7_3.2\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"pacemaker / pacemaker-cli / pacemaker-cluster-libs / pacemaker-cts / etc\");\n }\n}\n", "title": "RHEL 7 : pacemaker (RHSA-2016:2614)", "type": "nessus", "viewCount": 3}, "differentElements": ["description"], "edition": 9, "lastseen": "2019-01-09T04:11:20"}, {"bulletin": {"bulletinFamily": "scanner", "cpe": ["p-cpe:/a:redhat:enterprise_linux:pacemaker-nagios-plugins-metadata", "p-cpe:/a:redhat:enterprise_linux:pacemaker", "p-cpe:/a:redhat:enterprise_linux:pacemaker-cli", "cpe:/o:redhat:enterprise_linux:7", "p-cpe:/a:redhat:enterprise_linux:pacemaker-libs-devel", "p-cpe:/a:redhat:enterprise_linux:pacemaker-debuginfo", "p-cpe:/a:redhat:enterprise_linux:pacemaker-doc", "p-cpe:/a:redhat:enterprise_linux:pacemaker-remote", "p-cpe:/a:redhat:enterprise_linux:pacemaker-libs", "p-cpe:/a:redhat:enterprise_linux:pacemaker-cts", "p-cpe:/a:redhat:enterprise_linux:pacemaker-cluster-libs"], "cvelist": ["CVE-2016-7035"], "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "description": "An update for pacemaker is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.\n\nThe Pacemaker cluster resource manager is a collection of technologies working together to provide data integrity and the ability to maintain application availability in the event of a failure.\n\nSecurity Fix(es) :\n\n* An authorization flaw was found in Pacemaker, where it did not properly guard its IPC interface. An attacker with an unprivileged account on a Pacemaker node could use this flaw to, for example, force the Local Resource Manager daemon to execute a script as root and thereby gain root access on the machine. (CVE-2016-7035)\n\nThis issue was discovered by Jan 'poki' Pokorny (Red Hat) and Alain Moulle (ATOS/BULL).\n\nBug Fix(es) :\n\n* The version of Pacemaker in Red Hat Enterprise Linux 7.3 incorporated an increase in the version number of the remote node protocol. Consequently, cluster nodes running Pacemaker in Red Hat Enterprise Linux 7.3 and remote nodes running earlier versions of Red Hat Enterprise Linux were not able to communicate with each other unless special precautions were taken. This update preserves the rolling upgrade capability. (BZ#1389023)", "edition": 8, "enchantments": {"score": {"value": 7.2, "vector": "NONE"}}, "hash": "33aae7d61135d79c846dd913fcf6189911d4055f7024c4fd161c1d7a61dda3e9", "hashmap": [{"hash": "ca1edd2aaa7afc2aa7f795747410a457", "key": "references"}, {"hash": "a7ccf18e2c39956b395d903de76d2a66", "key": "title"}, {"hash": "cfd16da9581e0c21db590e40dfd9e493", "key": "cvss"}, {"hash": "8a0a2e79ca9788ec33d7f0b2f2bdaa1c", "key": "href"}, {"hash": "9cf00d658b687f030ebe173a0528c567", "key": "reporter"}, {"hash": "c5b884973d4e4cb35354348bbaf5ded8", "key": "description"}, {"hash": "f933fd280f290ef4f2e234bca87292b6", "key": "pluginID"}, {"hash": "a9f39e265a7e23b149ed8353722ba49b", "key": "published"}, {"hash": "9b23e8684dde88b793779b4aaede0947", "key": "cvelist"}, {"hash": "a53d6b49416abc7cac7f1d3b087962cd", "key": "sourceData"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "3c764d4cf584f9ded7aa4dcca57c78ff", "key": "modified"}, {"hash": "f032361abd001ada1fdd9acc841b5569", "key": "cpe"}, {"hash": "b46559ea68ec9a13474c3a7776817cfd", "key": "naslFamily"}], "history": [], "href": "https://www.tenable.com/plugins/index.php?view=single&id=94604", "id": "REDHAT-RHSA-2016-2614.NASL", "lastseen": "2019-01-08T14:10:34", "modified": "2018-11-10T00:00:00", "naslFamily": "Red Hat Local Security Checks", "objectVersion": "1.3", "pluginID": "94604", "published": "2016-11-07T00:00:00", "references": ["https://access.redhat.com/errata/RHSA-2016:2614", "https://access.redhat.com/security/cve/cve-2016-7035"], "reporter": "Tenable", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2016:2614. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(94604);\n script_version(\"2.6\");\n script_cvs_date(\"Date: 2018/11/10 11:49:55\");\n\n script_cve_id(\"CVE-2016-7035\");\n script_xref(name:\"RHSA\", value:\"2016:2614\");\n\n script_name(english:\"RHEL 7 : pacemaker (RHSA-2016:2614)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An update for pacemaker is now available for Red Hat Enterprise Linux\n7.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Important. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nThe Pacemaker cluster resource manager is a collection of technologies\nworking together to provide data integrity and the ability to maintain\napplication availability in the event of a failure.\n\nSecurity Fix(es) :\n\n* An authorization flaw was found in Pacemaker, where it did not\nproperly guard its IPC interface. An attacker with an unprivileged\naccount on a Pacemaker node could use this flaw to, for example, force\nthe Local Resource Manager daemon to execute a script as root and\nthereby gain root access on the machine. (CVE-2016-7035)\n\nThis issue was discovered by Jan 'poki' Pokorny (Red Hat) and Alain\nMoulle (ATOS/BULL).\n\nBug Fix(es) :\n\n* The version of Pacemaker in Red Hat Enterprise Linux 7.3\nincorporated an increase in the version number of the remote node\nprotocol. Consequently, cluster nodes running Pacemaker in Red Hat\nEnterprise Linux 7.3 and remote nodes running earlier versions of Red\nHat Enterprise Linux were not able to communicate with each other\nunless special precautions were taken. This update preserves the\nrolling upgrade capability. (BZ#1389023)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2016:2614\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2016-7035\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker-cli\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker-cluster-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker-cts\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker-libs-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker-nagios-plugins-metadata\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker-remote\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/11/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/11/07\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = eregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^7([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 7.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2016:2614\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"pacemaker-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"pacemaker-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"pacemaker-cli-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"pacemaker-cli-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"i686\", reference:\"pacemaker-cluster-libs-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"pacemaker-cluster-libs-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"pacemaker-cluster-libs-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"pacemaker-cts-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"pacemaker-cts-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"i686\", reference:\"pacemaker-debuginfo-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"pacemaker-debuginfo-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"pacemaker-debuginfo-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"pacemaker-doc-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"pacemaker-doc-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"i686\", reference:\"pacemaker-libs-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"pacemaker-libs-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"pacemaker-libs-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"i686\", reference:\"pacemaker-libs-devel-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"pacemaker-libs-devel-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"pacemaker-libs-devel-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"pacemaker-nagios-plugins-metadata-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"pacemaker-nagios-plugins-metadata-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"pacemaker-remote-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"pacemaker-remote-1.1.15-11.el7_3.2\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"pacemaker / pacemaker-cli / pacemaker-cluster-libs / pacemaker-cts / etc\");\n }\n}\n", "title": "RHEL 7 : pacemaker (RHSA-2016:2614)", "type": "nessus", "viewCount": 3}, "differentElements": ["modified", "sourceData"], "edition": 8, "lastseen": "2019-01-08T14:10:34"}, {"bulletin": {"bulletinFamily": "scanner", "cpe": [], "cvelist": ["CVE-2016-7035"], "cvss": {"score": 0.0, "vector": "NONE"}, "description": "An update for pacemaker is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.\n\nThe Pacemaker cluster resource manager is a collection of technologies working together to provide data integrity and the ability to maintain application availability in the event of a failure.\n\nSecurity Fix(es) :\n\n* An authorization flaw was found in Pacemaker, where it did not properly guard its IPC interface. An attacker with an unprivileged account on a Pacemaker node could use this flaw to, for example, force the Local Resource Manager daemon to execute a script as root and thereby gain root access on the machine. (CVE-2016-7035)\n\nThis issue was discovered by Jan 'poki' Pokorny (Red Hat) and Alain Moulle (ATOS/BULL).\n\nBug Fix(es) :\n\n* The version of Pacemaker in Red Hat Enterprise Linux 7.3 incorporated an increase in the version number of the remote node protocol. Consequently, cluster nodes running Pacemaker in Red Hat Enterprise Linux 7.3 and remote nodes running earlier versions of Red Hat Enterprise Linux were not able to communicate with each other unless special precautions were taken. This update preserves the rolling upgrade capability. (BZ#1389023)", "edition": 3, "enchantments": {}, "hash": "385d5b1256467e814f8ac7878d8e12b6ebc814e940446b20836a16f674e5a3da", "hashmap": [{"hash": "a38fb272fbba5c94d38affe0cd09ce26", "key": "sourceData"}, {"hash": "a7ccf18e2c39956b395d903de76d2a66", "key": "title"}, {"hash": "8a0a2e79ca9788ec33d7f0b2f2bdaa1c", "key": "href"}, {"hash": "9cf00d658b687f030ebe173a0528c567", "key": "reporter"}, {"hash": "a6e487b241db96af61fe671a1b90b041", "key": "modified"}, {"hash": "c5b884973d4e4cb35354348bbaf5ded8", "key": "description"}, {"hash": "f933fd280f290ef4f2e234bca87292b6", "key": "pluginID"}, {"hash": "a9f39e265a7e23b149ed8353722ba49b", "key": "published"}, {"hash": "9b23e8684dde88b793779b4aaede0947", "key": "cvelist"}, {"hash": "8cd4821cb504d25572038ed182587d85", "key": "cvss"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "b46559ea68ec9a13474c3a7776817cfd", "key": "naslFamily"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "cpe"}, {"hash": "7d94c79b751e6fd0820aa531ba026bed", "key": "references"}], "history": [], "href": "https://www.tenable.com/plugins/index.php?view=single&id=94604", "id": "REDHAT-RHSA-2016-2614.NASL", "lastseen": "2017-01-11T06:09:24", "modified": "2017-01-10T00:00:00", "naslFamily": "Red Hat Local Security Checks", "objectVersion": "1.2", "pluginID": "94604", "published": "2016-11-07T00:00:00", "references": ["https://www.redhat.com/security/data/cve/CVE-2016-7035.html", "http://rhn.redhat.com/errata/RHSA-2016-2614.html"], "reporter": "Tenable", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2016:2614. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(94604);\n script_version(\"$Revision: 2.3 $\");\n script_cvs_date(\"$Date: 2017/01/10 20:46:33 $\");\n\n script_cve_id(\"CVE-2016-7035\");\n script_osvdb_id(146618);\n script_xref(name:\"RHSA\", value:\"2016:2614\");\n\n script_name(english:\"RHEL 7 : pacemaker (RHSA-2016:2614)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An update for pacemaker is now available for Red Hat Enterprise Linux\n7.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Important. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nThe Pacemaker cluster resource manager is a collection of technologies\nworking together to provide data integrity and the ability to maintain\napplication availability in the event of a failure.\n\nSecurity Fix(es) :\n\n* An authorization flaw was found in Pacemaker, where it did not\nproperly guard its IPC interface. An attacker with an unprivileged\naccount on a Pacemaker node could use this flaw to, for example, force\nthe Local Resource Manager daemon to execute a script as root and\nthereby gain root access on the machine. (CVE-2016-7035)\n\nThis issue was discovered by Jan 'poki' Pokorny (Red Hat) and Alain\nMoulle (ATOS/BULL).\n\nBug Fix(es) :\n\n* The version of Pacemaker in Red Hat Enterprise Linux 7.3\nincorporated an increase in the version number of the remote node\nprotocol. Consequently, cluster nodes running Pacemaker in Red Hat\nEnterprise Linux 7.3 and remote nodes running earlier versions of Red\nHat Enterprise Linux were not able to communicate with each other\nunless special precautions were taken. This update preserves the\nrolling upgrade capability. (BZ#1389023)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.redhat.com/security/data/cve/CVE-2016-7035.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://rhn.redhat.com/errata/RHSA-2016-2614.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker-cli\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker-cluster-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker-cts\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker-libs-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker-nagios-plugins-metadata\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker-remote\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/11/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/11/07\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2017 Tenable Network Security, Inc.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = eregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^7([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 7.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2016:2614\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"pacemaker-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"pacemaker-cli-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"i686\", reference:\"pacemaker-cluster-libs-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"pacemaker-cluster-libs-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"pacemaker-cts-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"i686\", reference:\"pacemaker-debuginfo-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"pacemaker-debuginfo-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"pacemaker-doc-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"i686\", reference:\"pacemaker-libs-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"pacemaker-libs-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"i686\", reference:\"pacemaker-libs-devel-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"pacemaker-libs-devel-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"pacemaker-nagios-plugins-metadata-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"pacemaker-remote-1.1.15-11.el7_3.2\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"pacemaker / pacemaker-cli / pacemaker-cluster-libs / pacemaker-cts / etc\");\n }\n}\n", "title": "RHEL 7 : pacemaker (RHSA-2016:2614)", "type": "nessus", "viewCount": 3}, "differentElements": ["cpe"], "edition": 3, "lastseen": "2017-01-11T06:09:24"}, {"bulletin": {"bulletinFamily": "scanner", "cpe": ["p-cpe:/a:redhat:enterprise_linux:pacemaker-nagios-plugins-metadata", "p-cpe:/a:redhat:enterprise_linux:pacemaker", "p-cpe:/a:redhat:enterprise_linux:pacemaker-cli", "cpe:/o:redhat:enterprise_linux:7", "p-cpe:/a:redhat:enterprise_linux:pacemaker-libs-devel", "p-cpe:/a:redhat:enterprise_linux:pacemaker-debuginfo", "p-cpe:/a:redhat:enterprise_linux:pacemaker-doc", "p-cpe:/a:redhat:enterprise_linux:pacemaker-remote", "p-cpe:/a:redhat:enterprise_linux:pacemaker-libs", "p-cpe:/a:redhat:enterprise_linux:pacemaker-cts", "p-cpe:/a:redhat:enterprise_linux:pacemaker-cluster-libs"], "cvelist": ["CVE-2016-7035"], "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "description": "An update for pacemaker is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.\n\nThe Pacemaker cluster resource manager is a collection of technologies working together to provide data integrity and the ability to maintain application availability in the event of a failure.\n\nSecurity Fix(es) :\n\n* An authorization flaw was found in Pacemaker, where it did not properly guard its IPC interface. An attacker with an unprivileged account on a Pacemaker node could use this flaw to, for example, force the Local Resource Manager daemon to execute a script as root and thereby gain root access on the machine. (CVE-2016-7035)\n\nThis issue was discovered by Jan 'poki' Pokorny (Red Hat) and Alain Moulle (ATOS/BULL).\n\nBug Fix(es) :\n\n* The version of Pacemaker in Red Hat Enterprise Linux 7.3 incorporated an increase in the version number of the remote node protocol. Consequently, cluster nodes running Pacemaker in Red Hat Enterprise Linux 7.3 and remote nodes running earlier versions of Red Hat Enterprise Linux were not able to communicate with each other unless special precautions were taken. This update preserves the rolling upgrade capability. (BZ#1389023)", "edition": 11, "enchantments": {"dependencies": {"modified": "2019-02-21T01:28:22", "references": [{"idList": ["CESA-2016:2614", "CESA-2016:2675"], "type": "centos"}, {"idList": ["FEDORA_2016-242FF9A2FA.NASL", "OPENSUSE-2016-1447.NASL", "SL_20161108_PACEMAKER_ON_SL6_X.NASL", "FEDORA_2016-C1CBCC4528.NASL", "REDHAT-RHSA-2016-2675.NASL", "SL_20161103_PACEMAKER_ON_SL7_X.NASL", "CENTOS_RHSA-2016-2675.NASL", "FEDORA_2016-2A159EF513.NASL", "GENTOO_GLSA-201710-08.NASL", "CENTOS_RHSA-2016-2614.NASL"], "type": "nessus"}, {"idList": ["OPENSUSE-SU-2016:2965-1", "SUSE-SU-2016:2869-1"], "type": "suse"}, {"idList": ["CVE-2016-7035"], "type": "cve"}, {"idList": ["OPENVAS:1361412562310810175", "OPENVAS:1361412562310872033", "OPENVAS:1361412562310810188", "OPENVAS:1361412562310882590", "OPENVAS:1361412562310843346", "OPENVAS:1361412562310851502"], "type": "openvas"}, {"idList": ["RHSA-2016:2675", "RHSA-2016:2614"], "type": "redhat"}, {"idList": ["GLSA-201710-08"], "type": "gentoo"}, {"idList": ["USN-3462-1"], "type": "ubuntu"}]}, "score": {"modified": "2019-02-21T01:28:22", "value": 6.6, "vector": "NONE"}}, "hash": "b894bdb61d9b3e38a2e9f95520622a15f2f2e8cc6c5c1bfc742a62022e02bade", "hashmap": [{"hash": "ca1edd2aaa7afc2aa7f795747410a457", "key": "references"}, {"hash": "a7ccf18e2c39956b395d903de76d2a66", "key": "title"}, {"hash": "cfd16da9581e0c21db590e40dfd9e493", "key": "cvss"}, {"hash": "8a0a2e79ca9788ec33d7f0b2f2bdaa1c", "key": "href"}, {"hash": "9cf00d658b687f030ebe173a0528c567", "key": "reporter"}, {"hash": "c5b884973d4e4cb35354348bbaf5ded8", "key": "description"}, {"hash": "f933fd280f290ef4f2e234bca87292b6", "key": "pluginID"}, {"hash": "a9f39e265a7e23b149ed8353722ba49b", "key": "published"}, {"hash": "9b23e8684dde88b793779b4aaede0947", "key": "cvelist"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "f032361abd001ada1fdd9acc841b5569", "key": "cpe"}, {"hash": "de6c54194cb6f640b1e75f710a6f9167", "key": "modified"}, {"hash": "b46559ea68ec9a13474c3a7776817cfd", "key": "naslFamily"}, {"hash": "1a0bce048027b1e57fafbab858643492", "key": "sourceData"}], "history": [], "href": "https://www.tenable.com/plugins/index.php?view=single&id=94604", "id": "REDHAT-RHSA-2016-2614.NASL", "lastseen": "2019-02-21T01:28:22", "modified": "2019-01-08T00:00:00", "naslFamily": "Red Hat Local Security Checks", "objectVersion": "1.3", "pluginID": "94604", "published": "2016-11-07T00:00:00", "references": ["https://access.redhat.com/errata/RHSA-2016:2614", "https://access.redhat.com/security/cve/cve-2016-7035"], "reporter": "Tenable", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2016:2614. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(94604);\n script_version(\"2.7\");\n script_cvs_date(\"Date: 2019/01/08 11:01:15\");\n\n script_cve_id(\"CVE-2016-7035\");\n script_xref(name:\"RHSA\", value:\"2016:2614\");\n\n script_name(english:\"RHEL 7 : pacemaker (RHSA-2016:2614)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An update for pacemaker is now available for Red Hat Enterprise Linux\n7.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Important. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nThe Pacemaker cluster resource manager is a collection of technologies\nworking together to provide data integrity and the ability to maintain\napplication availability in the event of a failure.\n\nSecurity Fix(es) :\n\n* An authorization flaw was found in Pacemaker, where it did not\nproperly guard its IPC interface. An attacker with an unprivileged\naccount on a Pacemaker node could use this flaw to, for example, force\nthe Local Resource Manager daemon to execute a script as root and\nthereby gain root access on the machine. (CVE-2016-7035)\n\nThis issue was discovered by Jan 'poki' Pokorny (Red Hat) and Alain\nMoulle (ATOS/BULL).\n\nBug Fix(es) :\n\n* The version of Pacemaker in Red Hat Enterprise Linux 7.3\nincorporated an increase in the version number of the remote node\nprotocol. Consequently, cluster nodes running Pacemaker in Red Hat\nEnterprise Linux 7.3 and remote nodes running earlier versions of Red\nHat Enterprise Linux were not able to communicate with each other\nunless special precautions were taken. This update preserves the\nrolling upgrade capability. (BZ#1389023)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2016:2614\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2016-7035\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker-cli\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker-cluster-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker-cts\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker-libs-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker-nagios-plugins-metadata\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker-remote\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/11/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/11/07\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = eregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^7([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 7.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2016:2614\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"pacemaker-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"pacemaker-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"pacemaker-cli-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"pacemaker-cli-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"i686\", reference:\"pacemaker-cluster-libs-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"pacemaker-cluster-libs-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"pacemaker-cluster-libs-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"pacemaker-cts-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"pacemaker-cts-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"i686\", reference:\"pacemaker-debuginfo-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"pacemaker-debuginfo-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"pacemaker-debuginfo-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"pacemaker-doc-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"pacemaker-doc-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"i686\", reference:\"pacemaker-libs-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"pacemaker-libs-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"pacemaker-libs-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"i686\", reference:\"pacemaker-libs-devel-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"pacemaker-libs-devel-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"pacemaker-libs-devel-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"pacemaker-nagios-plugins-metadata-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"pacemaker-nagios-plugins-metadata-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"pacemaker-remote-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"pacemaker-remote-1.1.15-11.el7_3.2\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"pacemaker / pacemaker-cli / pacemaker-cluster-libs / pacemaker-cts / etc\");\n }\n}\n", "title": "RHEL 7 : pacemaker (RHSA-2016:2614)", "type": "nessus", "viewCount": 4}, "differentElements": ["cvss", "description", "reporter", "modified", "sourceData", "href"], "edition": 11, "lastseen": "2019-02-21T01:28:22"}], "edition": 13, "hashmap": [{"key": "bulletinFamily", "hash": "bbdaea376f500d25f6b0c1050311dd07"}, {"key": "cpe", "hash": "f032361abd001ada1fdd9acc841b5569"}, {"key": "cvelist", "hash": "9b23e8684dde88b793779b4aaede0947"}, {"key": "cvss", "hash": "f74481c4d3fb2a622ac8c8a438ded811"}, {"key": "description", "hash": "2a270e0fc2ecc2b4dd229fa1eeede16f"}, {"key": "href", "hash": "529a70b67716eba87087ca22d8762127"}, {"key": "modified", "hash": "abcf9266f425f12dda38f529cd4a94bc"}, {"key": "naslFamily", "hash": "b46559ea68ec9a13474c3a7776817cfd"}, {"key": "pluginID", "hash": "f933fd280f290ef4f2e234bca87292b6"}, {"key": "published", "hash": "a9f39e265a7e23b149ed8353722ba49b"}, {"key": "references", "hash": "ca1edd2aaa7afc2aa7f795747410a457"}, {"key": "reporter", "hash": "b7beaf9d124542f914ef08e608facdab"}, {"key": "sourceData", "hash": "21a312809270e08ac10c76f85c9e38be"}, {"key": "title", "hash": "a7ccf18e2c39956b395d903de76d2a66"}, {"key": "type", "hash": "5e0bd03bec244039678f2b955a2595aa"}], "hash": "5dbfe5d68d2956246bb1a1e627c8414d56bc6c91278afae22195d3a6004c25ce", "viewCount": 5, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2016-7035"]}, {"type": "redhat", "idList": ["RHSA-2016:2614", "RHSA-2016:2675"]}, {"type": "nessus", "idList": ["CENTOS_RHSA-2016-2614.NASL", "FEDORA_2016-2A159EF513.NASL", "SL_20161108_PACEMAKER_ON_SL6_X.NASL", "FEDORA_2016-C1CBCC4528.NASL", "SL_20161103_PACEMAKER_ON_SL7_X.NASL", "CENTOS_RHSA-2016-2675.NASL", "REDHAT-RHSA-2016-2675.NASL", "FEDORA_2016-242FF9A2FA.NASL", "UBUNTU_USN-3462-1.NASL", "GENTOO_GLSA-201710-08.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310872033", "OPENVAS:1361412562310810175", "OPENVAS:1361412562310882590", "OPENVAS:1361412562310810188", "OPENVAS:1361412562310851502", "OPENVAS:1361412562310843346"]}, {"type": "centos", "idList": ["CESA-2016:2614", "CESA-2016:2675"]}, {"type": "gentoo", "idList": ["GLSA-201710-08"]}, {"type": "ubuntu", "idList": ["USN-3462-1"]}, {"type": "suse", "idList": ["SUSE-SU-2016:2869-1", "OPENSUSE-SU-2016:2965-1"]}], "modified": "2019-11-01T03:21:15"}, "score": {"value": 7.2, "vector": "NONE", "modified": "2019-11-01T03:21:15"}, "vulnersScore": 7.2}, "objectVersion": "1.3", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2016:2614. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(94604);\n script_version(\"2.10\");\n script_cvs_date(\"Date: 2019/10/24 15:35:42\");\n\n script_cve_id(\"CVE-2016-7035\");\n script_xref(name:\"RHSA\", value:\"2016:2614\");\n\n script_name(english:\"RHEL 7 : pacemaker (RHSA-2016:2614)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An update for pacemaker is now available for Red Hat Enterprise Linux\n7.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Important. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nThe Pacemaker cluster resource manager is a collection of technologies\nworking together to provide data integrity and the ability to maintain\napplication availability in the event of a failure.\n\nSecurity Fix(es) :\n\n* An authorization flaw was found in Pacemaker, where it did not\nproperly guard its IPC interface. An attacker with an unprivileged\naccount on a Pacemaker node could use this flaw to, for example, force\nthe Local Resource Manager daemon to execute a script as root and\nthereby gain root access on the machine. (CVE-2016-7035)\n\nThis issue was discovered by Jan 'poki' Pokorny (Red Hat) and Alain\nMoulle (ATOS/BULL).\n\nBug Fix(es) :\n\n* The version of Pacemaker in Red Hat Enterprise Linux 7.3\nincorporated an increase in the version number of the remote node\nprotocol. Consequently, cluster nodes running Pacemaker in Red Hat\nEnterprise Linux 7.3 and remote nodes running earlier versions of Red\nHat Enterprise Linux were not able to communicate with each other\nunless special precautions were taken. This update preserves the\nrolling upgrade capability. (BZ#1389023)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2016:2614\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2016-7035\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker-cli\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker-cluster-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker-cts\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker-libs-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker-nagios-plugins-metadata\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker-remote\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/09/10\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/11/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/11/07\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^7([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 7.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2016:2614\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"pacemaker-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"pacemaker-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"pacemaker-cli-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"pacemaker-cli-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"i686\", reference:\"pacemaker-cluster-libs-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"pacemaker-cluster-libs-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"pacemaker-cluster-libs-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"pacemaker-cts-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"pacemaker-cts-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"i686\", reference:\"pacemaker-debuginfo-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"pacemaker-debuginfo-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"pacemaker-debuginfo-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"pacemaker-doc-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"pacemaker-doc-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"i686\", reference:\"pacemaker-libs-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"pacemaker-libs-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"pacemaker-libs-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"i686\", reference:\"pacemaker-libs-devel-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"pacemaker-libs-devel-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"pacemaker-libs-devel-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"pacemaker-nagios-plugins-metadata-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"pacemaker-nagios-plugins-metadata-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"pacemaker-remote-1.1.15-11.el7_3.2\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"pacemaker-remote-1.1.15-11.el7_3.2\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"pacemaker / pacemaker-cli / pacemaker-cluster-libs / pacemaker-cts / etc\");\n }\n}\n", "naslFamily": "Red Hat Local Security Checks", "pluginID": "94604", "cpe": ["p-cpe:/a:redhat:enterprise_linux:pacemaker-nagios-plugins-metadata", "p-cpe:/a:redhat:enterprise_linux:pacemaker", "p-cpe:/a:redhat:enterprise_linux:pacemaker-cli", "cpe:/o:redhat:enterprise_linux:7", "p-cpe:/a:redhat:enterprise_linux:pacemaker-libs-devel", "p-cpe:/a:redhat:enterprise_linux:pacemaker-debuginfo", "p-cpe:/a:redhat:enterprise_linux:pacemaker-doc", "p-cpe:/a:redhat:enterprise_linux:pacemaker-remote", "p-cpe:/a:redhat:enterprise_linux:pacemaker-libs", "p-cpe:/a:redhat:enterprise_linux:pacemaker-cts", "p-cpe:/a:redhat:enterprise_linux:pacemaker-cluster-libs"], "scheme": null}
{"cve": [{"lastseen": "2019-10-10T12:14:51", "bulletinFamily": "NVD", "description": "An authorization flaw was found in Pacemaker before 1.1.16, where it did not properly guard its IPC interface. An attacker with an unprivileged account on a Pacemaker node could use this flaw to, for example, force the Local Resource Manager daemon to execute a script as root and thereby gain root access on the machine.", "modified": "2019-10-09T23:19:00", "id": "CVE-2016-7035", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-7035", "published": "2018-09-10T16:29:00", "title": "CVE-2016-7035", "type": "cve", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}], "redhat": [{"lastseen": "2019-08-13T18:46:47", "bulletinFamily": "unix", "description": "The Pacemaker cluster resource manager is a collection of technologies working together to provide data integrity and the ability to maintain application availability in the event of a failure.\n\nSecurity Fix(es):\n\n* An authorization flaw was found in Pacemaker, where it did not properly guard its IPC interface. An attacker with an unprivileged account on a Pacemaker node could use this flaw to, for example, force the Local Resource Manager daemon to execute a script as root and thereby gain root access on the machine. (CVE-2016-7035)\n\nThis issue was discovered by Jan \"poki\" Pokorny (Red Hat) and Alain Moulle (ATOS/BULL).\n\nBug Fix(es):\n\n* The version of Pacemaker in Red Hat Enterprise Linux 7.3 incorporated an increase in the version number of the remote node protocol. Consequently, cluster nodes running Pacemaker in Red Hat Enterprise Linux 7.3 and remote nodes running earlier versions of Red Hat Enterprise Linux were not able to communicate with each other unless special precautions were taken. This update preserves the rolling upgrade capability. (BZ#1389023)", "modified": "2018-04-12T03:31:34", "published": "2016-11-03T15:40:05", "id": "RHSA-2016:2614", "href": "https://access.redhat.com/errata/RHSA-2016:2614", "type": "redhat", "title": "(RHSA-2016:2614) Important: pacemaker security and bug fix update", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-08-13T18:46:04", "bulletinFamily": "unix", "description": "The Pacemaker cluster resource manager is a collection of technologies working together to provide data integrity and the ability to maintain application availability in the event of a failure.\n\nSecurity Fix(es):\n\n* An authorization flaw was found in Pacemaker, where it did not properly guard its IPC interface. An attacker with an unprivileged account on a Pacemaker node could use this flaw to, for example, force the Local Resource Manager daemon to execute a script as root and thereby gain root access on the machine. (CVE-2016-7035)\n\nThis issue was discovered by Jan \"poki\" Pokorny (Red Hat) and Alain Moulle (ATOS/BULL).", "modified": "2018-06-09T14:15:17", "published": "2016-11-08T17:55:03", "id": "RHSA-2016:2675", "href": "https://access.redhat.com/errata/RHSA-2016:2675", "type": "redhat", "title": "(RHSA-2016:2675) Important: pacemaker security update", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}], "nessus": [{"lastseen": "2019-11-01T02:27:27", "bulletinFamily": "scanner", "description": "Security fix for CVE-2016-7035 (improper IPC guarding)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.", "modified": "2019-11-02T00:00:00", "id": "FEDORA_2016-2A159EF513.NASL", "href": "https://www.tenable.com/plugins/nessus/94657", "published": "2016-11-10T00:00:00", "title": "Fedora 23 : pacemaker (2016-2a159ef513)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory FEDORA-2016-2a159ef513.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(94657);\n script_version(\"2.3\");\n script_cvs_date(\"Date: 2019/09/25 17:12:07\");\n\n script_cve_id(\"CVE-2016-7035\");\n script_xref(name:\"FEDORA\", value:\"2016-2a159ef513\");\n\n script_name(english:\"Fedora 23 : pacemaker (2016-2a159ef513)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Security fix for CVE-2016-7035 (improper IPC guarding)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2016-2a159ef513\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected pacemaker package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:pacemaker\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:23\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/09/10\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/11/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/11/10\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = pregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^23([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 23\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"FC23\", reference:\"pacemaker-1.1.15-2.fc23\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"pacemaker\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-11-01T02:15:34", "bulletinFamily": "scanner", "description": "An update for pacemaker is now available for Red Hat Enterprise Linux\n7.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Important. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nThe Pacemaker cluster resource manager is a collection of technologies\nworking together to provide data integrity and the ability to maintain\napplication availability in the event of a failure.\n\nSecurity Fix(es) :\n\n* An authorization flaw was found in Pacemaker, where it did not\nproperly guard its IPC interface. An attacker with an unprivileged\naccount on a Pacemaker node could use this flaw to, for example, force\nthe Local Resource Manager daemon to execute a script as root and\nthereby gain root access on the machine. (CVE-2016-7035)\n\nThis issue was discovered by Jan ", "modified": "2019-11-02T00:00:00", "id": "CENTOS_RHSA-2016-2614.NASL", "href": "https://www.tenable.com/plugins/nessus/95353", "published": "2016-11-28T00:00:00", "title": "CentOS 7 : pacemaker (CESA-2016:2614)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2016:2614 and \n# CentOS Errata and Security Advisory 2016:2614 respectively.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(95353);\n script_version(\"3.6\");\n script_cvs_date(\"Date: 2019/10/02 15:30:20\");\n\n script_cve_id(\"CVE-2016-7035\");\n script_xref(name:\"RHSA\", value:\"2016:2614\");\n\n script_name(english:\"CentOS 7 : pacemaker (CESA-2016:2614)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An update for pacemaker is now available for Red Hat Enterprise Linux\n7.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Important. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nThe Pacemaker cluster resource manager is a collection of technologies\nworking together to provide data integrity and the ability to maintain\napplication availability in the event of a failure.\n\nSecurity Fix(es) :\n\n* An authorization flaw was found in Pacemaker, where it did not\nproperly guard its IPC interface. An attacker with an unprivileged\naccount on a Pacemaker node could use this flaw to, for example, force\nthe Local Resource Manager daemon to execute a script as root and\nthereby gain root access on the machine. (CVE-2016-7035)\n\nThis issue was discovered by Jan 'poki' Pokorny (Red Hat) and Alain\nMoulle (ATOS/BULL).\n\nBug Fix(es) :\n\n* The version of Pacemaker in Red Hat Enterprise Linux 7.3\nincorporated an increase in the version number of the remote node\nprotocol. Consequently, cluster nodes running Pacemaker in Red Hat\nEnterprise Linux 7.3 and remote nodes running earlier versions of Red\nHat Enterprise Linux were not able to communicate with each other\nunless special precautions were taken. This update preserves the\nrolling upgrade capability. (BZ#1389023)\"\n );\n # https://lists.centos.org/pipermail/centos-cr-announce/2016-November/003685.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?6fdcfca3\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected pacemaker packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:pacemaker\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:pacemaker-cli\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:pacemaker-cluster-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:pacemaker-cts\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:pacemaker-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:pacemaker-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:pacemaker-libs-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:pacemaker-nagios-plugins-metadata\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:pacemaker-remote\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:7\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/09/10\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/11/25\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/11/28\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^7([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 7.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"pacemaker-1.1.15-11.el7_3.2\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"pacemaker-cli-1.1.15-11.el7_3.2\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"pacemaker-cluster-libs-1.1.15-11.el7_3.2\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"pacemaker-cts-1.1.15-11.el7_3.2\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"pacemaker-doc-1.1.15-11.el7_3.2\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"pacemaker-libs-1.1.15-11.el7_3.2\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"pacemaker-libs-devel-1.1.15-11.el7_3.2\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"pacemaker-nagios-plugins-metadata-1.1.15-11.el7_3.2\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"pacemaker-remote-1.1.15-11.el7_3.2\")) flag++;\n\n\nif (flag)\n{\n cr_plugin_caveat = '\\n' +\n 'NOTE: The security advisory associated with this vulnerability has a\\n' +\n 'fixed package version that may only be available in the continuous\\n' +\n 'release (CR) repository for CentOS, until it is present in the next\\n' +\n 'point release of CentOS.\\n\\n' +\n\n 'If an equal or higher package level does not exist in the baseline\\n' +\n 'repository for your major version of CentOS, then updates from the CR\\n' +\n 'repository will need to be applied in order to address the\\n' +\n 'vulnerability.\\n';\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + cr_plugin_caveat\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"pacemaker / pacemaker-cli / pacemaker-cluster-libs / pacemaker-cts / etc\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-11-01T02:27:33", "bulletinFamily": "scanner", "description": "Security fix for CVE-2016-7035 (improper IPC guarding)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.", "modified": "2019-11-02T00:00:00", "id": "FEDORA_2016-C1CBCC4528.NASL", "href": "https://www.tenable.com/plugins/nessus/94857", "published": "2016-11-15T00:00:00", "title": "Fedora 25 : pacemaker (2016-c1cbcc4528)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory FEDORA-2016-c1cbcc4528.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(94857);\n script_version(\"2.3\");\n script_cvs_date(\"Date: 2019/09/25 17:12:09\");\n\n script_cve_id(\"CVE-2016-7035\");\n script_xref(name:\"FEDORA\", value:\"2016-c1cbcc4528\");\n\n script_name(english:\"Fedora 25 : pacemaker (2016-c1cbcc4528)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Security fix for CVE-2016-7035 (improper IPC guarding)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2016-c1cbcc4528\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected pacemaker package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:pacemaker\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:25\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/09/10\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/11/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/11/15\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = pregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^25([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 25\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"FC25\", reference:\"pacemaker-1.1.15-3.fc25\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"pacemaker\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-11-03T12:13:12", "bulletinFamily": "scanner", "description": "Security Fix(es) :\n\n - An authorization flaw was found in Pacemaker, where it\n did not properly guard its IPC interface. An attacker\n with an unprivileged account on a Pacemaker node could\n use this flaw to, for example, force the Local Resource\n Manager daemon to execute a script as root and thereby\n gain root access on the machine. (CVE-2016-7035)\n\nThis issue was discovered by Jan ", "modified": "2019-11-02T00:00:00", "id": "SL_20161108_PACEMAKER_ON_SL6_X.NASL", "href": "https://www.tenable.com/plugins/nessus/94653", "published": "2016-11-09T00:00:00", "title": "Scientific Linux Security Update : pacemaker on SL6.x i386/x86_64", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text is (C) Scientific Linux.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(94653);\n script_version(\"2.3\");\n script_cvs_date(\"Date: 2019/01/08 11:01:15\");\n\n script_cve_id(\"CVE-2016-7035\");\n\n script_name(english:\"Scientific Linux Security Update : pacemaker on SL6.x i386/x86_64\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Scientific Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Security Fix(es) :\n\n - An authorization flaw was found in Pacemaker, where it\n did not properly guard its IPC interface. An attacker\n with an unprivileged account on a Pacemaker node could\n use this flaw to, for example, force the Local Resource\n Manager daemon to execute a script as root and thereby\n gain root access on the machine. (CVE-2016-7035)\n\nThis issue was discovered by Jan 'poki' Pokorny (Red Hat) and Alain\nMoulle (ATOS/BULL).\"\n );\n # https://listserv.fnal.gov/scripts/wa.exe?A2=ind1611&L=scientific-linux-errata&F=&S=&P=1159\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?ab1b4a19\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"x-cpe:/o:fermilab:scientific_linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/11/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/11/09\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Scientific Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Scientific Linux \" >!< release) audit(AUDIT_HOST_NOT, \"running Scientific Linux\");\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Scientific Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"SL6\", reference:\"pacemaker-1.1.14-8.el6_8.2\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"pacemaker-cli-1.1.14-8.el6_8.2\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"pacemaker-cluster-libs-1.1.14-8.el6_8.2\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"pacemaker-cts-1.1.14-8.el6_8.2\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"pacemaker-debuginfo-1.1.14-8.el6_8.2\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"pacemaker-doc-1.1.14-8.el6_8.2\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"pacemaker-libs-1.1.14-8.el6_8.2\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"pacemaker-libs-devel-1.1.14-8.el6_8.2\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"pacemaker-remote-1.1.14-8.el6_8.2\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-11-01T02:15:34", "bulletinFamily": "scanner", "description": "An update for pacemaker is now available for Red Hat Enterprise Linux\n6.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Important. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nThe Pacemaker cluster resource manager is a collection of technologies\nworking together to provide data integrity and the ability to maintain\napplication availability in the event of a failure.\n\nSecurity Fix(es) :\n\n* An authorization flaw was found in Pacemaker, where it did not\nproperly guard its IPC interface. An attacker with an unprivileged\naccount on a Pacemaker node could use this flaw to, for example, force\nthe Local Resource Manager daemon to execute a script as root and\nthereby gain root access on the machine. (CVE-2016-7035)\n\nThis issue was discovered by Jan ", "modified": "2019-11-02T00:00:00", "id": "CENTOS_RHSA-2016-2675.NASL", "href": "https://www.tenable.com/plugins/nessus/94742", "published": "2016-11-14T00:00:00", "title": "CentOS 6 : pacemaker (CESA-2016:2675)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2016:2675 and \n# CentOS Errata and Security Advisory 2016:2675 respectively.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(94742);\n script_version(\"2.6\");\n script_cvs_date(\"Date: 2019/10/02 15:30:20\");\n\n script_cve_id(\"CVE-2016-7035\");\n script_xref(name:\"RHSA\", value:\"2016:2675\");\n\n script_name(english:\"CentOS 6 : pacemaker (CESA-2016:2675)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An update for pacemaker is now available for Red Hat Enterprise Linux\n6.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Important. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nThe Pacemaker cluster resource manager is a collection of technologies\nworking together to provide data integrity and the ability to maintain\napplication availability in the event of a failure.\n\nSecurity Fix(es) :\n\n* An authorization flaw was found in Pacemaker, where it did not\nproperly guard its IPC interface. An attacker with an unprivileged\naccount on a Pacemaker node could use this flaw to, for example, force\nthe Local Resource Manager daemon to execute a script as root and\nthereby gain root access on the machine. (CVE-2016-7035)\n\nThis issue was discovered by Jan 'poki' Pokorny (Red Hat) and Alain\nMoulle (ATOS/BULL).\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2016-November/022142.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?c61c094a\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected pacemaker packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:pacemaker\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:pacemaker-cli\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:pacemaker-cluster-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:pacemaker-cts\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:pacemaker-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:pacemaker-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:pacemaker-libs-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:pacemaker-remote\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:6\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/09/10\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/11/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/11/14\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 6.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-6\", reference:\"pacemaker-1.1.14-8.el6_8.2\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"pacemaker-cli-1.1.14-8.el6_8.2\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"pacemaker-cluster-libs-1.1.14-8.el6_8.2\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"pacemaker-cts-1.1.14-8.el6_8.2\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"pacemaker-doc-1.1.14-8.el6_8.2\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"pacemaker-libs-1.1.14-8.el6_8.2\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"pacemaker-libs-devel-1.1.14-8.el6_8.2\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"pacemaker-remote-1.1.14-8.el6_8.2\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"pacemaker / pacemaker-cli / pacemaker-cluster-libs / pacemaker-cts / etc\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-11-01T03:21:16", "bulletinFamily": "scanner", "description": "An update for pacemaker is now available for Red Hat Enterprise Linux\n6.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Important. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nThe Pacemaker cluster resource manager is a collection of technologies\nworking together to provide data integrity and the ability to maintain\napplication availability in the event of a failure.\n\nSecurity Fix(es) :\n\n* An authorization flaw was found in Pacemaker, where it did not\nproperly guard its IPC interface. An attacker with an unprivileged\naccount on a Pacemaker node could use this flaw to, for example, force\nthe Local Resource Manager daemon to execute a script as root and\nthereby gain root access on the machine. (CVE-2016-7035)\n\nThis issue was discovered by Jan ", "modified": "2019-11-02T00:00:00", "id": "REDHAT-RHSA-2016-2675.NASL", "href": "https://www.tenable.com/plugins/nessus/94651", "published": "2016-11-09T00:00:00", "title": "RHEL 6 : pacemaker (RHSA-2016:2675)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2016:2675. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(94651);\n script_version(\"2.11\");\n script_cvs_date(\"Date: 2019/10/24 15:35:42\");\n\n script_cve_id(\"CVE-2016-7035\");\n script_xref(name:\"RHSA\", value:\"2016:2675\");\n\n script_name(english:\"RHEL 6 : pacemaker (RHSA-2016:2675)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An update for pacemaker is now available for Red Hat Enterprise Linux\n6.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Important. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nThe Pacemaker cluster resource manager is a collection of technologies\nworking together to provide data integrity and the ability to maintain\napplication availability in the event of a failure.\n\nSecurity Fix(es) :\n\n* An authorization flaw was found in Pacemaker, where it did not\nproperly guard its IPC interface. An attacker with an unprivileged\naccount on a Pacemaker node could use this flaw to, for example, force\nthe Local Resource Manager daemon to execute a script as root and\nthereby gain root access on the machine. (CVE-2016-7035)\n\nThis issue was discovered by Jan 'poki' Pokorny (Red Hat) and Alain\nMoulle (ATOS/BULL).\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2016:2675\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2016-7035\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker-cli\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker-cluster-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker-cts\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker-libs-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:pacemaker-remote\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/09/10\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/11/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/11/09\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 6.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2016:2675\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"pacemaker-1.1.14-8.el6_8.2\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"pacemaker-1.1.14-8.el6_8.2\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"pacemaker-cli-1.1.14-8.el6_8.2\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"pacemaker-cli-1.1.14-8.el6_8.2\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"pacemaker-cluster-libs-1.1.14-8.el6_8.2\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"pacemaker-cluster-libs-1.1.14-8.el6_8.2\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"pacemaker-cts-1.1.14-8.el6_8.2\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"pacemaker-cts-1.1.14-8.el6_8.2\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"pacemaker-debuginfo-1.1.14-8.el6_8.2\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"pacemaker-debuginfo-1.1.14-8.el6_8.2\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"pacemaker-doc-1.1.14-8.el6_8.2\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"pacemaker-doc-1.1.14-8.el6_8.2\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"pacemaker-libs-1.1.14-8.el6_8.2\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"pacemaker-libs-1.1.14-8.el6_8.2\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"pacemaker-libs-devel-1.1.14-8.el6_8.2\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"pacemaker-libs-devel-1.1.14-8.el6_8.2\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"pacemaker-remote-1.1.14-8.el6_8.2\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"pacemaker-remote-1.1.14-8.el6_8.2\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"pacemaker / pacemaker-cli / pacemaker-cluster-libs / pacemaker-cts / etc\");\n }\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-11-01T02:27:27", "bulletinFamily": "scanner", "description": "Security fix for CVE-2016-7035 (improper IPC guarding)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.", "modified": "2019-11-02T00:00:00", "id": "FEDORA_2016-242FF9A2FA.NASL", "href": "https://www.tenable.com/plugins/nessus/94590", "published": "2016-11-07T00:00:00", "title": "Fedora 24 : pacemaker (2016-242ff9a2fa)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory FEDORA-2016-242ff9a2fa.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(94590);\n script_version(\"2.3\");\n script_cvs_date(\"Date: 2019/09/25 17:12:07\");\n\n script_cve_id(\"CVE-2016-7035\");\n script_xref(name:\"FEDORA\", value:\"2016-242ff9a2fa\");\n\n script_name(english:\"Fedora 24 : pacemaker (2016-242ff9a2fa)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Security fix for CVE-2016-7035 (improper IPC guarding)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2016-242ff9a2fa\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected pacemaker package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:pacemaker\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:24\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/09/10\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/11/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/11/07\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = pregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^24([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 24\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"FC24\", reference:\"pacemaker-1.1.15-2.fc24\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"pacemaker\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-11-03T12:13:11", "bulletinFamily": "scanner", "description": "Security Fix(es) :\n\n - An authorization flaw was found in Pacemaker, where it\n did not properly guard its IPC interface. An attacker\n with an unprivileged account on a Pacemaker node could\n use this flaw to, for example, force the Local Resource\n Manager daemon to execute a script as root and thereby\n gain root access on the machine. (CVE-2016-7035)\n\nBug Fix(es) :\n\n - The version of Pacemaker in Scientific Linux 7.3\n incorporated an increase in the version number of the\n remote node protocol. Consequently, cluster nodes\n running Pacemaker in Scientific Linux 7.3 and remote\n nodes running earlier versions of Scientific Linux were\n not able to communicate with each other unless special\n precautions were taken. This update preserves the\n rolling upgrade capability.", "modified": "2019-11-02T00:00:00", "id": "SL_20161103_PACEMAKER_ON_SL7_X.NASL", "href": "https://www.tenable.com/plugins/nessus/95852", "published": "2016-12-15T00:00:00", "title": "Scientific Linux Security Update : pacemaker on SL7.x x86_64", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text is (C) Scientific Linux.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(95852);\n script_version(\"3.4\");\n script_cvs_date(\"Date: 2019/01/08 11:01:15\");\n\n script_cve_id(\"CVE-2016-7035\");\n\n script_name(english:\"Scientific Linux Security Update : pacemaker on SL7.x x86_64\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Scientific Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Security Fix(es) :\n\n - An authorization flaw was found in Pacemaker, where it\n did not properly guard its IPC interface. An attacker\n with an unprivileged account on a Pacemaker node could\n use this flaw to, for example, force the Local Resource\n Manager daemon to execute a script as root and thereby\n gain root access on the machine. (CVE-2016-7035)\n\nBug Fix(es) :\n\n - The version of Pacemaker in Scientific Linux 7.3\n incorporated an increase in the version number of the\n remote node protocol. Consequently, cluster nodes\n running Pacemaker in Scientific Linux 7.3 and remote\n nodes running earlier versions of Scientific Linux were\n not able to communicate with each other unless special\n precautions were taken. This update preserves the\n rolling upgrade capability.\"\n );\n # https://listserv.fnal.gov/scripts/wa.exe?A2=ind1612&L=scientific-linux-errata&F=&S=&P=1035\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?a90da07d\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"x-cpe:/o:fermilab:scientific_linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/11/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/12/15\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Scientific Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Scientific Linux \" >!< release) audit(AUDIT_HOST_NOT, \"running Scientific Linux\");\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Scientific Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"SL7\", cpu:\"x86_64\", reference:\"pacemaker-1.1.15-11.el7_3.2\")) flag++;\nif (rpm_check(release:\"SL7\", cpu:\"x86_64\", reference:\"pacemaker-cli-1.1.15-11.el7_3.2\")) flag++;\nif (rpm_check(release:\"SL7\", cpu:\"x86_64\", reference:\"pacemaker-cluster-libs-1.1.15-11.el7_3.2\")) flag++;\nif (rpm_check(release:\"SL7\", cpu:\"x86_64\", reference:\"pacemaker-cts-1.1.15-11.el7_3.2\")) flag++;\nif (rpm_check(release:\"SL7\", cpu:\"x86_64\", reference:\"pacemaker-debuginfo-1.1.15-11.el7_3.2\")) flag++;\nif (rpm_check(release:\"SL7\", cpu:\"x86_64\", reference:\"pacemaker-doc-1.1.15-11.el7_3.2\")) flag++;\nif (rpm_check(release:\"SL7\", cpu:\"x86_64\", reference:\"pacemaker-libs-1.1.15-11.el7_3.2\")) flag++;\nif (rpm_check(release:\"SL7\", cpu:\"x86_64\", reference:\"pacemaker-libs-devel-1.1.15-11.el7_3.2\")) flag++;\nif (rpm_check(release:\"SL7\", cpu:\"x86_64\", reference:\"pacemaker-nagios-plugins-metadata-1.1.15-11.el7_3.2\")) flag++;\nif (rpm_check(release:\"SL7\", cpu:\"x86_64\", reference:\"pacemaker-remote-1.1.15-11.el7_3.2\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-11-01T02:41:04", "bulletinFamily": "scanner", "description": "The remote host is affected by the vulnerability described in GLSA-201710-08\n(Pacemaker: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in Pacemaker. Please\n review the referenced CVE identifiers for details.\n \nImpact :\n\n A remote attacker could execute arbitrary code or a local attacker could\n escalate privileges.\n \nWorkaround :\n\n There is no known workaround at this time.", "modified": "2019-11-02T00:00:00", "id": "GENTOO_GLSA-201710-08.NASL", "href": "https://www.tenable.com/plugins/nessus/103726", "published": "2017-10-09T00:00:00", "title": "GLSA-201710-08 : Pacemaker: Multiple vulnerabilities", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 201710-08.\n#\n# The advisory text is Copyright (C) 2001-2019 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(103726);\n script_version(\"3.2\");\n script_cvs_date(\"Date: 2019/01/08 11:01:15\");\n\n script_cve_id(\"CVE-2015-1867\", \"CVE-2016-7035\");\n script_xref(name:\"GLSA\", value:\"201710-08\");\n\n script_name(english:\"GLSA-201710-08 : Pacemaker: Multiple vulnerabilities\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is affected by the vulnerability described in GLSA-201710-08\n(Pacemaker: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in Pacemaker. Please\n review the referenced CVE identifiers for details.\n \nImpact :\n\n A remote attacker could execute arbitrary code or a local attacker could\n escalate privileges.\n \nWorkaround :\n\n There is no known workaround at this time.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/201710-08\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"All Pacemaker users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=sys-cluster/pacemaker-1.1.16 '\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:pacemaker\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/10/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/10/09\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"sys-cluster/pacemaker\", unaffected:make_list(\"ge 1.1.16 \"), vulnerable:make_list(\"lt 1.1.16\"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"Pacemaker\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-11-03T12:32:16", "bulletinFamily": "scanner", "description": "Jan Pokorny and Alain Moulle discovered that Pacemaker incorrectly\nhandled the IPC interface. A local attacker could possibly use this\nissue to execute arbitrary code with root privileges. (CVE-2016-7035)\n\nAlain Moulle discovered that Pacemaker incorrectly handled\nauthentication. A remote attacker could possibly use this issue to\nshut down connections, leading to a denial of service. This issue only\naffected Ubuntu 16.04 LTS. (CVE-2016-7797).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "modified": "2019-11-02T00:00:00", "id": "UBUNTU_USN-3462-1.NASL", "href": "https://www.tenable.com/plugins/nessus/104143", "published": "2017-10-25T00:00:00", "title": "Ubuntu 14.04 LTS / 16.04 LTS : pacemaker vulnerabilities (USN-3462-1)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-3462-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(104143);\n script_version(\"3.7\");\n script_cvs_date(\"Date: 2019/09/18 12:31:47\");\n\n script_cve_id(\"CVE-2016-7035\", \"CVE-2016-7797\");\n script_xref(name:\"USN\", value:\"3462-1\");\n\n script_name(english:\"Ubuntu 14.04 LTS / 16.04 LTS : pacemaker vulnerabilities (USN-3462-1)\");\n script_summary(english:\"Checks dpkg output for updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Ubuntu host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Jan Pokorny and Alain Moulle discovered that Pacemaker incorrectly\nhandled the IPC interface. A local attacker could possibly use this\nissue to execute arbitrary code with root privileges. (CVE-2016-7035)\n\nAlain Moulle discovered that Pacemaker incorrectly handled\nauthentication. A remote attacker could possibly use this issue to\nshut down connections, leading to a denial of service. This issue only\naffected Ubuntu 16.04 LTS. (CVE-2016-7797).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/3462-1/\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected pacemaker package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:pacemaker\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:14.04\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:16.04\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/03/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/10/24\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/10/25\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2017-2019 Canonical, Inc. / NASL script (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(14\\.04|16\\.04)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 14.04 / 16.04\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"14.04\", pkgname:\"pacemaker\", pkgver:\"1.1.10+git20130802-1ubuntu2.4\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"pacemaker\", pkgver:\"1.1.14-2ubuntu1.2\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"pacemaker\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}], "openvas": [{"lastseen": "2019-05-29T18:35:06", "bulletinFamily": "scanner", "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2016-12-07T00:00:00", "id": "OPENVAS:1361412562310872033", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310872033", "title": "Fedora Update for pacemaker FEDORA-2016-c1cbcc4528", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for pacemaker FEDORA-2016-c1cbcc4528\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2016 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.872033\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2016-12-07 05:25:12 +0100 (Wed, 07 Dec 2016)\");\n script_cve_id(\"CVE-2016-7035\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for pacemaker FEDORA-2016-c1cbcc4528\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'pacemaker'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"pacemaker on Fedora 25\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"FEDORA\", value:\"2016-c1cbcc4528\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4QARLGTS6VLGZTMUCAQSNWI7OJRZ7FVI\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC25\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC25\")\n{\n\n if ((res = isrpmvuln(pkg:\"pacemaker\", rpm:\"pacemaker~1.1.15~3.fc25\", rls:\"FC25\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:35:36", "bulletinFamily": "scanner", "description": "Check the version of pacemaker", "modified": "2019-03-08T00:00:00", "published": "2016-11-13T00:00:00", "id": "OPENVAS:1361412562310882590", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310882590", "title": "CentOS Update for pacemaker CESA-2016:2675 centos6", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for pacemaker CESA-2016:2675 centos6\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2016 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.882590\");\n script_version(\"$Revision: 14058 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-08 14:25:52 +0100 (Fri, 08 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2016-11-13 05:45:22 +0100 (Sun, 13 Nov 2016)\");\n script_cve_id(\"CVE-2016-7035\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"CentOS Update for pacemaker CESA-2016:2675 centos6\");\n script_tag(name:\"summary\", value:\"Check the version of pacemaker\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"The Pacemaker cluster resource manager is\na collection of technologies working together to provide data integrity and the\nability to maintain application availability in the event of a failure.\n\nSecurity Fix(es):\n\n * An authorization flaw was found in Pacemaker, where it did not properly\nguard its IPC interface. An attacker with an unprivileged account on a\nPacemaker node could use this flaw to, for example, force the Local\nResource Manager daemon to execute a script as root and thereby gain root\naccess on the machine. (CVE-2016-7035)\n\nThis issue was discovered by Jan 'poki' Pokorny (Red Hat) and Alain Moulle\n(ATOS/BULL).\");\n script_tag(name:\"affected\", value:\"pacemaker on CentOS 6\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n\n script_xref(name:\"CESA\", value:\"2016:2675\");\n script_xref(name:\"URL\", value:\"http://lists.centos.org/pipermail/centos-announce/2016-November/022142.html\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\", re:\"ssh/login/release=CentOS6\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"CentOS6\")\n{\n\n if ((res = isrpmvuln(pkg:\"pacemaker\", rpm:\"pacemaker~1.1.14~8.el6_8.2\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"pacemaker-cli\", rpm:\"pacemaker-cli~1.1.14~8.el6_8.2\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"pacemaker-cluster-libs\", rpm:\"pacemaker-cluster-libs~1.1.14~8.el6_8.2\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"pacemaker-cts\", rpm:\"pacemaker-cts~1.1.14~8.el6_8.2\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"pacemaker-doc\", rpm:\"pacemaker-doc~1.1.14~8.el6_8.2\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"pacemaker-libs\", rpm:\"pacemaker-libs~1.1.14~8.el6_8.2\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"pacemaker-libs-devel\", rpm:\"pacemaker-libs-devel~1.1.14~8.el6_8.2\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"pacemaker-remote\", rpm:\"pacemaker-remote~1.1.14~8.el6_8.2\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:35:21", "bulletinFamily": "scanner", "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2016-12-02T00:00:00", "id": "OPENVAS:1361412562310810175", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310810175", "title": "Fedora Update for pacemaker FEDORA-2016-242ff9a2fa", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for pacemaker FEDORA-2016-242ff9a2fa\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2016 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.810175\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2016-12-02 14:05:40 +0100 (Fri, 02 Dec 2016)\");\n script_cve_id(\"CVE-2016-7035\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for pacemaker FEDORA-2016-242ff9a2fa\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'pacemaker'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"pacemaker on Fedora 24\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"FEDORA\", value:\"2016-242ff9a2fa\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3GH3HCJUBSFFCBM3UG4WJCPU4BFQCEMP\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC24\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC24\")\n{\n\n if ((res = isrpmvuln(pkg:\"pacemaker\", rpm:\"pacemaker~1.1.15~2.fc24\", rls:\"FC24\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:35:12", "bulletinFamily": "scanner", "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2016-12-02T00:00:00", "id": "OPENVAS:1361412562310810188", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310810188", "title": "Fedora Update for pacemaker FEDORA-2016-2a159ef513", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for pacemaker FEDORA-2016-2a159ef513\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2016 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.810188\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2016-12-02 14:06:35 +0100 (Fri, 02 Dec 2016)\");\n script_cve_id(\"CVE-2016-7035\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for pacemaker FEDORA-2016-2a159ef513\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'pacemaker'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"pacemaker on Fedora 23\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"FEDORA\", value:\"2016-2a159ef513\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/274QI7QA2K2AKV45N5UJVKS4NBRW4MUX\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC23\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC23\")\n{\n\n if ((res = isrpmvuln(pkg:\"pacemaker\", rpm:\"pacemaker~1.1.15~2.fc23\", rls:\"FC23\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:34:51", "bulletinFamily": "scanner", "description": "The remote host is missing an update for the ", "modified": "2019-03-13T00:00:00", "published": "2017-10-25T00:00:00", "id": "OPENVAS:1361412562310843346", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310843346", "title": "Ubuntu Update for pacemaker USN-3462-1", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_3462_1.nasl 14140 2019-03-13 12:26:09Z cfischer $\n#\n# Ubuntu Update for pacemaker USN-3462-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.843346\");\n script_version(\"$Revision: 14140 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 13:26:09 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2017-10-25 15:05:46 +0200 (Wed, 25 Oct 2017)\");\n script_cve_id(\"CVE-2016-7035\", \"CVE-2016-7797\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Ubuntu Update for pacemaker USN-3462-1\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'pacemaker'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"Jan Pokorn and Alain Moulle discovered that\n Pacemaker incorrectly handled the IPC interface. A local attacker could possibly\n use this issue to execute arbitrary code with root privileges. (CVE-2016-7035)\n Alain Moulle discovered that Pacemaker incorrectly handled authentication. A\n remote attacker could possibly use this issue to shut down connections, leading\n to a denial of service. This issue only affected Ubuntu 16.04 LTS.\n (CVE-2016-7797)\");\n script_tag(name:\"affected\", value:\"pacemaker on Ubuntu 16.04 LTS,\n Ubuntu 14.04 LTS\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n\n script_xref(name:\"USN\", value:\"3462-1\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-3462-1/\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU(14\\.04 LTS|16\\.04 LTS)\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU14.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"pacemaker\", ver:\"1.1.10+git20130802-1ubuntu2.4\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU16.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"pacemaker\", ver:\"1.1.14-2ubuntu1.2\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:34:42", "bulletinFamily": "scanner", "description": "The remote host is missing an update for the ", "modified": "2019-01-10T00:00:00", "published": "2017-02-22T00:00:00", "id": "OPENVAS:1361412562310851502", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310851502", "title": "SuSE Update for pacemaker openSUSE-SU-2016:2965-1 (pacemaker)", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_suse_2016_2965_1.nasl 13012 2019-01-10 08:11:33Z asteins $\n#\n# SuSE Update for pacemaker openSUSE-SU-2016:2965-1 (pacemaker)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.851502\");\n script_version(\"$Revision: 13012 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-01-10 09:11:33 +0100 (Thu, 10 Jan 2019) $\");\n script_tag(name:\"creation_date\", value:\"2017-02-22 15:16:00 +0100 (Wed, 22 Feb 2017)\");\n script_cve_id(\"CVE-2016-7035\", \"CVE-2016-7797\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"SuSE Update for pacemaker openSUSE-SU-2016:2965-1 (pacemaker)\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'pacemaker'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"This update for pacemaker fixes the following issues:\n\n Security issues fixed:\n\n - CVE-2016-7797: Notify other clients of a new connection only if the\n handshake has completed (bsc#967388, bsc#1002767).\n\n - CVE-2016-7035: Fixed improper IPC guarding in pacemaker (bsc#1007433).\n\n Bug fixes:\n\n - bsc#1003565: crmd: Record pending operations in the CIB before they are\n performed\n\n - bsc#1000743: pengine: Do not fence a maintenance node if it shuts down\n cleanly\n\n - bsc#987348: ping: Avoid temporary files for fping check\n\n - bsc#986644: libcrmcommon: report errors consistently when waiting for\n data on connection\n\n - bsc#986644: remote: Correctly calculate the remaining timeouts when\n receiving messages\n\n This update was imported from the SUSE:SLE-12-SP2:Update update project.\");\n script_tag(name:\"affected\", value:\"pacemaker on openSUSE Leap 42.2\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n\n script_xref(name:\"openSUSE-SU\", value:\"2016:2965_1\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\", re:\"ssh/login/release=openSUSELeap42\\.2\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\nres = \"\";\n\nif(release == \"openSUSELeap42.2\")\n{\n\n if ((res = isrpmvuln(pkg:\"libpacemaker-devel\", rpm:\"libpacemaker-devel~1.1.15~5.1\", rls:\"openSUSELeap42.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libpacemaker3\", rpm:\"libpacemaker3~1.1.15~5.1\", rls:\"openSUSELeap42.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libpacemaker3-debuginfo\", rpm:\"libpacemaker3-debuginfo~1.1.15~5.1\", rls:\"openSUSELeap42.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"pacemaker\", rpm:\"pacemaker~1.1.15~5.1\", rls:\"openSUSELeap42.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"pacemaker-cli\", rpm:\"pacemaker-cli~1.1.15~5.1\", rls:\"openSUSELeap42.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"pacemaker-cli-debuginfo\", rpm:\"pacemaker-cli-debuginfo~1.1.15~5.1\", rls:\"openSUSELeap42.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"pacemaker-cts\", rpm:\"pacemaker-cts~1.1.15~5.1\", rls:\"openSUSELeap42.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"pacemaker-cts-debuginfo\", rpm:\"pacemaker-cts-debuginfo~1.1.15~5.1\", rls:\"openSUSELeap42.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"pacemaker-debuginfo\", rpm:\"pacemaker-debuginfo~1.1.15~5.1\", rls:\"openSUSELeap42.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"pacemaker-debugsource\", rpm:\"pacemaker-debugsource~1.1.15~5.1\", rls:\"openSUSELeap42.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"pacemaker-remote\", rpm:\"pacemaker-remote~1.1.15~5.1\", rls:\"openSUSELeap42.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"pacemaker-remote-debuginfo\", rpm:\"pacemaker-remote-debuginfo~1.1.15~5.1\", rls:\"openSUSELeap42.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}], "centos": [{"lastseen": "2019-05-29T18:34:25", "bulletinFamily": "unix", "description": "**CentOS Errata and Security Advisory** CESA-2016:2675\n\n\nThe Pacemaker cluster resource manager is a collection of technologies working together to provide data integrity and the ability to maintain application availability in the event of a failure.\n\nSecurity Fix(es):\n\n* An authorization flaw was found in Pacemaker, where it did not properly guard its IPC interface. An attacker with an unprivileged account on a Pacemaker node could use this flaw to, for example, force the Local Resource Manager daemon to execute a script as root and thereby gain root access on the machine. (CVE-2016-7035)\n\nThis issue was discovered by Jan \"poki\" Pokorny (Red Hat) and Alain Moulle (ATOS/BULL).\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2016-November/022142.html\n\n**Affected packages:**\npacemaker\npacemaker-cli\npacemaker-cluster-libs\npacemaker-cts\npacemaker-doc\npacemaker-libs\npacemaker-libs-devel\npacemaker-remote\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2016-2675.html", "modified": "2016-11-12T06:32:37", "published": "2016-11-12T06:32:37", "id": "CESA-2016:2675", "href": "http://lists.centos.org/pipermail/centos-announce/2016-November/022142.html", "title": "pacemaker security update", "type": "centos", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:33:46", "bulletinFamily": "unix", "description": "**CentOS Errata and Security Advisory** CESA-2016:2614\n\n\nThe Pacemaker cluster resource manager is a collection of technologies working together to provide data integrity and the ability to maintain application availability in the event of a failure.\n\nSecurity Fix(es):\n\n* An authorization flaw was found in Pacemaker, where it did not properly guard its IPC interface. An attacker with an unprivileged account on a Pacemaker node could use this flaw to, for example, force the Local Resource Manager daemon to execute a script as root and thereby gain root access on the machine. (CVE-2016-7035)\n\nThis issue was discovered by Jan \"poki\" Pokorny (Red Hat) and Alain Moulle (ATOS/BULL).\n\nBug Fix(es):\n\n* The version of Pacemaker in Red Hat Enterprise Linux 7.3 incorporated an increase in the version number of the remote node protocol. Consequently, cluster nodes running Pacemaker in Red Hat Enterprise Linux 7.3 and remote nodes running earlier versions of Red Hat Enterprise Linux were not able to communicate with each other unless special precautions were taken. This update preserves the rolling upgrade capability. (BZ#1389023)\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-cr-announce/2016-November/003685.html\n\n**Affected packages:**\npacemaker\npacemaker-cli\npacemaker-cluster-libs\npacemaker-cts\npacemaker-doc\npacemaker-libs\npacemaker-libs-devel\npacemaker-nagios-plugins-metadata\npacemaker-remote\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2016-2614.html", "modified": "2016-11-25T16:47:54", "published": "2016-11-25T16:47:54", "href": "http://lists.centos.org/pipermail/centos-cr-announce/2016-November/003685.html", "id": "CESA-2016:2614", "title": "pacemaker security update", "type": "centos", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}], "gentoo": [{"lastseen": "2017-10-08T18:16:25", "bulletinFamily": "unix", "description": "### Background\n\nPacemaker is an Open Source, High Availability resource manager suitable for both small and large clusters. \n\n### Description\n\nMultiple vulnerabilities have been discovered in Pacemaker. Please review the referenced CVE identifiers for details. \n\n### Impact\n\nA remote attacker could execute arbitrary code or a local attacker could escalate privileges. \n\n### Workaround\n\nThere is no known workaround at this time.\n\n### Resolution\n\nAll Pacemaker users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=sys-cluster/pacemaker-1.1.16 \"", "modified": "2017-10-08T00:00:00", "published": "2017-10-08T00:00:00", "href": "https://security.gentoo.org/glsa/201710-08", "id": "GLSA-201710-08", "title": "Pacemaker: Multiple vulnerabilities", "type": "gentoo", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "ubuntu": [{"lastseen": "2019-05-29T19:21:56", "bulletinFamily": "unix", "description": "Jan Pokorn\u00fd and Alain Moulle discovered that Pacemaker incorrectly handled the IPC interface. A local attacker could possibly use this issue to execute arbitrary code with root privileges. (CVE-2016-7035)\n\nAlain Moulle discovered that Pacemaker incorrectly handled authentication. A remote attacker could possibly use this issue to shut down connections, leading to a denial of service. This issue only affected Ubuntu 16.04 LTS. (CVE-2016-7797)", "modified": "2017-10-24T00:00:00", "published": "2017-10-24T00:00:00", "id": "USN-3462-1", "href": "https://usn.ubuntu.com/3462-1/", "title": "Pacemaker vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}], "suse": [{"lastseen": "2016-11-22T17:28:19", "bulletinFamily": "unix", "description": "This update for pacemaker fixes the following issues:\n\n Security issues fixed:\n - CVE-2016-7797: Notify other clients of a new connection only if the\n handshake has completed (bsc#967388, bsc#1002767).\n - CVE-2016-7035: Fixed improper IPC guarding in pacemaker (bsc#1007433).\n\n Bug fixes:\n - bsc#1003565: crmd: Record pending operations in the CIB before they are\n performed\n - bsc#1000743: pengine: Do not fence a maintenance node if it shuts down\n cleanly\n - bsc#987348: ping: Avoid temporary files for fping check\n - bsc#986644: libcrmcommon: report errors consistently when waiting for\n data on connection\n - bsc#986644: remote: Correctly calculate the remaining timeouts when\n receiving messages\n\n", "modified": "2016-11-22T15:07:40", "published": "2016-11-22T15:07:40", "id": "SUSE-SU-2016:2869-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2016-11/msg00038.html", "type": "suse", "title": "Security update for pacemaker (important)", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2016-12-01T17:30:25", "bulletinFamily": "unix", "description": "This update for pacemaker fixes the following issues:\n\n Security issues fixed:\n - CVE-2016-7797: Notify other clients of a new connection only if the\n handshake has completed (bsc#967388, bsc#1002767).\n - CVE-2016-7035: Fixed improper IPC guarding in pacemaker (bsc#1007433).\n\n Bug fixes:\n - bsc#1003565: crmd: Record pending operations in the CIB before they are\n performed\n - bsc#1000743: pengine: Do not fence a maintenance node if it shuts down\n cleanly\n - bsc#987348: ping: Avoid temporary files for fping check\n - bsc#986644: libcrmcommon: report errors consistently when waiting for\n data on connection\n - bsc#986644: remote: Correctly calculate the remaining timeouts when\n receiving messages\n\n This update was imported from the SUSE:SLE-12-SP2:Update update project.\n\n", "modified": "2016-12-01T18:13:18", "published": "2016-12-01T18:13:18", "href": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00001.html", "id": "OPENSUSE-SU-2016:2965-1", "type": "suse", "title": "Security update for pacemaker (important)", "cvss": {"score": 0.0, "vector": "NONE"}}]}