CVE-2016-3728

Related Vulnerabilities: CVE-2016-3728  

It was found that the “variant” parameter in the TFTP API of Foreman was passed to the eval() function. An attacker could possibly use this flaw to execute arbitrary code with the privileges of the Foreman user.

It was found that the “variant” parameter in the TFTP API of Foreman was passed to the eval() function. An attacker could possibly use this flaw to execute arbitrary code with the privileges of the Foreman user.

Find out more about CVE-2016-3728 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v2 metrics

Base Score 5.1
Base Metrics AV:N/AC:H/Au:N/C:P/I:P/A:P
Access Vector Network
Access Complexity High
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Satellite Capsule 6.2 (foreman) RHBA-2016:1501 2016-07-27
Red Hat Satellite 6.1 - Optional (foreman) RHBA-2016:1501 2016-07-27
Red Hat Satellite Capsule 6.1 (foreman) RHBA-2016:1501 2016-07-27
Red Hat Satellite 6.2 (foreman) RHBA-2016:1501 2016-07-27

Affected Packages State

Platform Package State
Red Hat Satellite 6 foreman Will not fix
Red Hat Ceph Storage 1.3 foreman Will not fix
OpenStack 6 Installer for RHEL 7 foreman Will not fix

Acknowledgements

Red Hat would like to thank the Foreman project for reporting this issue. Upstream acknowledges Lukas Zapletal (Red Hat) as the original reporter.