CVE-2010-2496

stonith-ng in pacemaker and cluster-glue passed passwords as commandline parameters, making it possible for local attackers to gain access to passwords of the HA stack and potentially influence its operations. This is fixed in cluster-glue 1.0.6 and newer, and pacemaker 1.1.3 and newer.
References
Link Resource
https://bugzilla.suse.com/show_bug.cgi?id=CVE-2010-2496 Issue Tracking Mailing List Patch Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:clusterlabs:cluster_glue:*:*:*:*:*:*:*:*
cpe:2.3:a:clusterlabs:pacemaker:*:*:*:*:*:*:*:*

History

21 Oct 2021, 22:49

Type Values Removed Values Added
CWE CWE-287
CVSS v2 : unknown
v3 : unknown
v2 : 2.1
v3 : 5.5
CPE cpe:2.3:a:clusterlabs:cluster_glue:*:*:*:*:*:*:*:*
cpe:2.3:a:clusterlabs:pacemaker:*:*:*:*:*:*:*:*
References (MISC) https://bugzilla.suse.com/show_bug.cgi?id=CVE-2010-2496 - (MISC) https://bugzilla.suse.com/show_bug.cgi?id=CVE-2010-2496 - Issue Tracking, Mailing List, Patch, Third Party Advisory

18 Oct 2021, 13:39

Type Values Removed Values Added
New CVE

Information

Published : 2021-10-18 13:15

Updated : 2023-12-10 14:09


NVD link : CVE-2010-2496

Mitre link : CVE-2010-2496

CVE.ORG link : CVE-2010-2496


JSON object : View

Products Affected

clusterlabs

  • cluster_glue
  • pacemaker
CWE
CWE-287

Improper Authentication