Plattform
linux
Komponente
pacemaker
Behoben in
2.0.2
CVE-2019-3885 describes a use-after-free vulnerability discovered in Pacemaker, a cluster resource manager. This flaw allows for the potential leakage of sensitive information through system logs, potentially exposing critical configuration details or operational data. The vulnerability affects Pacemaker versions up to and including 2.0.1, and a fix is available in version 2.0.2.
The primary impact of CVE-2019-3885 is the potential for sensitive information to be leaked via system logs. While the CVSS score is LOW, the exposure of sensitive data, such as cluster configuration details, credentials, or internal state information, could be exploited to gain a deeper understanding of the cluster environment. An attacker could leverage this information for reconnaissance, potentially leading to further attacks or unauthorized access. The use-after-free nature of the vulnerability suggests a potential for denial-of-service (DoS) if exploited, although this is not explicitly stated in the description.
CVE-2019-3885 was publicly disclosed on April 18, 2019. There is no indication of active exploitation or KEV listing at the time of this writing. Public proof-of-concept (PoC) code is not widely available, suggesting a relatively low probability of immediate exploitation. The LOW CVSS score further reinforces this assessment.
Organizations heavily reliant on Pacemaker for high-availability cluster management are at increased risk. This includes environments with sensitive data or critical services managed by Pacemaker clusters. Systems with older Pacemaker versions (≤2.0.1) that have not been regularly patched are particularly vulnerable.
• linux / server:
journalctl -u pacemaker | grep -i error• linux / server:
ps aux | grep pacemaker• linux / server:
ls -l /usr/lib/pacemaker/disclosure
Exploit-Status
EPSS
0.14% (35% Perzentil)
CVSS-Vektor
The recommended mitigation for CVE-2019-3885 is to upgrade Pacemaker to version 2.0.2 or later. If an immediate upgrade is not feasible, consider implementing stricter access controls to system logs to limit the visibility of sensitive information. Monitoring system logs for unusual activity or errors related to Pacemaker can also help detect potential exploitation attempts. While a WAF is unlikely to directly mitigate this vulnerability, reviewing and hardening Pacemaker's configuration can reduce the attack surface.
Aktualisieren Sie pacemaker auf eine Version nach 2.0.1. Dies behebt die Use-after-free Schwachstelle, die sensible Informationen über die Systemprotokolle leaken könnte.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2019-3885 is a use-after-free vulnerability affecting Pacemaker versions up to 2.0.1, potentially leading to sensitive information leakage through system logs.
You are affected if you are running Pacemaker version 2.0.1 or earlier. Upgrade to version 2.0.2 or later to mitigate the vulnerability.
Upgrade Pacemaker to version 2.0.2 or later. If immediate upgrade is not possible, restrict access to system logs and monitor for unusual activity.
There is currently no evidence of active exploitation of CVE-2019-3885.
Refer to the Pacemaker project website and relevant security mailing lists for official advisories and updates related to CVE-2019-3885.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.