An authorization flaw was found in Pacemaker before 1.1.16, where it did not properly guard its IPC interface. An attacker with an unprivileged account on a Pacemaker node could use this flaw to, for example, force the Local Resource Manager daemon to execute a script as root and thereby gain root access on the machine.
The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Pacemaker | Clusterlabs | * | 1.1.16 (including) |
Red Hat Enterprise Linux 6 | RedHat | pacemaker-0:1.1.14-8.el6_8.2 | * |
Red Hat Enterprise Linux 7 | RedHat | pacemaker-0:1.1.15-11.el7_3.2 | * |
Pacemaker | Ubuntu | precise | * |
Pacemaker | Ubuntu | trusty | * |
Pacemaker | Ubuntu | upstream | * |
Pacemaker | Ubuntu | xenial | * |
Pacemaker | Ubuntu | yakkety | * |
Assuming a user with a given identity, authorization is the process of determining whether that user can access a given resource, based on the user’s privileges and any permissions or other access-control specifications that apply to the resource. When access control checks are not applied consistently - or not at all - users are able to access data or perform actions that they should not be allowed to perform. This can lead to a wide range of problems, including information exposures, denial of service, and arbitrary code execution.