Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-15718

Опубликовано: 04 сент. 2019
Источник: debian

Описание

In systemd 240, bus_open_system_watch_bind_with_description in shared/bus-util.c (as used by systemd-resolved to connect to the system D-Bus instance), calls sd_bus_set_trusted, which disables access controls for incoming D-Bus messages. An unprivileged user can exploit this by executing D-Bus methods that should be restricted to privileged users, in order to change the system's DNS resolver settings.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
systemdfixed242-7package
systemdfixed241-7~deb10u2busterpackage
systemdnot-affectedstretchpackage
systemdnot-affectedjessiepackage

Примечания

  • https://www.openwall.com/lists/oss-security/2019/09/03/1

  • https://github.com/systemd/systemd/pull/13457

  • https://github.com/systemd/systemd/commit/35e528018f315798d3bffcb592b32a0d8f5162bd

Связанные уязвимости

CVSS3: 4.4
ubuntu
больше 6 лет назад

In systemd 240, bus_open_system_watch_bind_with_description in shared/bus-util.c (as used by systemd-resolved to connect to the system D-Bus instance), calls sd_bus_set_trusted, which disables access controls for incoming D-Bus messages. An unprivileged user can exploit this by executing D-Bus methods that should be restricted to privileged users, in order to change the system's DNS resolver settings.

CVSS3: 5.3
redhat
больше 6 лет назад

In systemd 240, bus_open_system_watch_bind_with_description in shared/bus-util.c (as used by systemd-resolved to connect to the system D-Bus instance), calls sd_bus_set_trusted, which disables access controls for incoming D-Bus messages. An unprivileged user can exploit this by executing D-Bus methods that should be restricted to privileged users, in order to change the system's DNS resolver settings.

CVSS3: 4.4
nvd
больше 6 лет назад

In systemd 240, bus_open_system_watch_bind_with_description in shared/bus-util.c (as used by systemd-resolved to connect to the system D-Bus instance), calls sd_bus_set_trusted, which disables access controls for incoming D-Bus messages. An unprivileged user can exploit this by executing D-Bus methods that should be restricted to privileged users, in order to change the system's DNS resolver settings.

github
больше 3 лет назад

In systemd 240, bus_open_system_watch_bind_with_description in shared/bus-util.c (as used by systemd-resolved to connect to the system D-Bus instance), calls sd_bus_set_trusted, which disables access controls for incoming D-Bus messages. An unprivileged user can exploit this by executing D-Bus methods that should be restricted to privileged users, in order to change the system's DNS resolver settings.

oracle-oval
около 6 лет назад

ELSA-2019-3592: systemd security, bug fix, and enhancement update (MODERATE)