Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-16866

Опубликовано: 11 янв. 2019
Источник: debian
EPSS Низкий

Описание

An out of bounds read was discovered in systemd-journald in the way it parses log messages that terminate with a colon ':'. A local attacker can use this flaw to disclose process memory data. Versions from v221 to v239 are vulnerable.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
systemdfixed240-1package
systemdnot-affectedjessiepackage

Примечания

  • Introduced in: https://github.com/systemd/systemd/commit/ec5ff4445cca6a1d786b8da36cf6fe0acc0b94c8 (v221)

  • Fixed by: https://github.com/systemd/systemd/commit/a6aadf4ae0bae185dc4c414d492a4a781c80ffe5 (v240) [1/2]

  • Fixed by: https://github.com/systemd/systemd/commit/8595102d3ddde6d25c282f965573a6de34ab4421 (v240) [2/2]

  • https://www.openwall.com/lists/oss-security/2019/01/09/3

  • https://www.qualys.com/2019/01/09/system-down/system-down.txt

EPSS

Процентиль: 28%
0.001
Низкий

Связанные уязвимости

CVSS3: 3.3
ubuntu
больше 6 лет назад

An out of bounds read was discovered in systemd-journald in the way it parses log messages that terminate with a colon ':'. A local attacker can use this flaw to disclose process memory data. Versions from v221 to v239 are vulnerable.

CVSS3: 4.3
redhat
больше 6 лет назад

An out of bounds read was discovered in systemd-journald in the way it parses log messages that terminate with a colon ':'. A local attacker can use this flaw to disclose process memory data. Versions from v221 to v239 are vulnerable.

CVSS3: 3.3
nvd
больше 6 лет назад

An out of bounds read was discovered in systemd-journald in the way it parses log messages that terminate with a colon ':'. A local attacker can use this flaw to disclose process memory data. Versions from v221 to v239 are vulnerable.

CVSS3: 3.3
msrc
около 5 лет назад

Описание отсутствует

CVSS3: 3.3
github
больше 3 лет назад

An out of bounds read was discovered in systemd-journald in the way it parses log messages that terminate with a colon ':'. A local attacker can use this flaw to disclose process memory data. Versions from v221 to v239 are vulnerable.

EPSS

Процентиль: 28%
0.001
Низкий