{"id":"CVE-2018-16877","details":"A flaw was found in the way pacemaker's client-server authentication was implemented in versions up to and including 2.0.0. A local attacker could use this flaw, and combine it with other IPC weaknesses, to achieve local privilege escalation.","modified":"2026-04-16T00:00:08.119717437Z","published":"2019-04-18T18:29:00.297Z","related":["SUSE-SU-2019:1047-1","SUSE-SU-2019:1108-1","SUSE-SU-2019:1209-1","SUSE-SU-2019:2268-1","SUSE-SU-2020:1072-1","openSUSE-SU-2019:1400-1","openSUSE-SU-2024:11138-1"],"database_specific":{"unresolved_ranges":[{"extracted_events":[{"last_affected":"16.04"}],"cpe":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"18.04"}],"cpe":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"18.10"}],"cpe":"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"19.04"}],"cpe":"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"9.0"}],"cpe":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"28"}],"cpe":"cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"29"}],"cpe":"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"30"}],"cpe":"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"15.0"}],"cpe":"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"42.3"}],"cpe":"cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"8.0"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"8.1"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"8.2"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"8.4"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"8.6"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"8.2"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"8.4"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"8.6"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"8.2"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"8.4"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"8.6"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*","source":"CPE_FIELD"}]},"references":[{"type":"WEB","url":"http://www.securityfocus.com/bid/108042"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3GCWFO7GL6MBU6C4BGFO3P6L77DIBBF3/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FY4M4RMIG2POKC6OOFQODGKPRYXHET2F/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HR6QUYGML735EI3HEEHYRDW7EG73BUH2/"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00012.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00034.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:1278"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:1279"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/01/msg00007.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202309-09"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3952-1/"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16877"},{"type":"FIX","url":"https://github.com/ClusterLabs/pacemaker/pull/1749"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/clusterlabs/pacemaker","events":[{"introduced":"0"},{"last_affected":"8cf3fe749e5ba7971154f66a799dda6cb92c8aad"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"last_affected":"2.0.0"}],"cpe":"cpe:2.3:a:clusterlabs:pacemaker:*:*:*:*:*:*:*:*","source":"CPE_FIELD"}}],"versions":["Pacemaker-0.6.0","Pacemaker-0.6.1","Pacemaker-0.6.2","Pacemaker-0.6.3","Pacemaker-0.6.5","Pacemaker-1.1.10","Pacemaker-1.1.10-rc1","Pacemaker-1.1.10-rc2","Pacemaker-1.1.10-rc3","Pacemaker-1.1.10-rc4","Pacemaker-1.1.10-rc5","Pacemaker-1.1.10-rc6","Pacemaker-1.1.10-rc7","Pacemaker-1.1.11-rc1","Pacemaker-1.1.11-rc3","Pacemaker-1.1.13-rc1","Pacemaker-1.1.14-rc4","Pacemaker-1.1.6","Pacemaker-1.1.6.1","Pacemaker-1.1.7","Pacemaker-1.1.8","Pacemaker-1.1.9","Pacemaker-2.0.0","Pacemaker-2.0.0-rc1","Pacemaker-2.0.0-rc2","Pacemaker-2.0.0-rc3","Pacemaker-2.0.0-rc4","Pacemaker-2.0.0-rc5","Pacemaker-2.0.0-rc6","RHEL6.3","RHEL6.4"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-16877.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}