Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-p39j-chr3-gjhq

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

In systemd 240, bus_open_system_watch_bind_with_description in shared/bus-util.c (as used by systemd-resolved to connect to the system D-Bus instance), calls sd_bus_set_trusted, which disables access controls for incoming D-Bus messages. An unprivileged user can exploit this by executing D-Bus methods that should be restricted to privileged users, in order to change the system's DNS resolver settings.

In systemd 240, bus_open_system_watch_bind_with_description in shared/bus-util.c (as used by systemd-resolved to connect to the system D-Bus instance), calls sd_bus_set_trusted, which disables access controls for incoming D-Bus messages. An unprivileged user can exploit this by executing D-Bus methods that should be restricted to privileged users, in order to change the system's DNS resolver settings.

EPSS

Процентиль: 29%
0.00105
Низкий

Связанные уязвимости

CVSS3: 4.4
ubuntu
больше 6 лет назад

In systemd 240, bus_open_system_watch_bind_with_description in shared/bus-util.c (as used by systemd-resolved to connect to the system D-Bus instance), calls sd_bus_set_trusted, which disables access controls for incoming D-Bus messages. An unprivileged user can exploit this by executing D-Bus methods that should be restricted to privileged users, in order to change the system's DNS resolver settings.

CVSS3: 5.3
redhat
больше 6 лет назад

In systemd 240, bus_open_system_watch_bind_with_description in shared/bus-util.c (as used by systemd-resolved to connect to the system D-Bus instance), calls sd_bus_set_trusted, which disables access controls for incoming D-Bus messages. An unprivileged user can exploit this by executing D-Bus methods that should be restricted to privileged users, in order to change the system's DNS resolver settings.

CVSS3: 4.4
nvd
больше 6 лет назад

In systemd 240, bus_open_system_watch_bind_with_description in shared/bus-util.c (as used by systemd-resolved to connect to the system D-Bus instance), calls sd_bus_set_trusted, which disables access controls for incoming D-Bus messages. An unprivileged user can exploit this by executing D-Bus methods that should be restricted to privileged users, in order to change the system's DNS resolver settings.

CVSS3: 4.4
debian
больше 6 лет назад

In systemd 240, bus_open_system_watch_bind_with_description in shared/ ...

oracle-oval
около 6 лет назад

ELSA-2019-3592: systemd security, bug fix, and enhancement update (MODERATE)

EPSS

Процентиль: 29%
0.00105
Низкий