Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2018-15686

Опубликовано: 26 окт. 2018
Источник: nvd
CVSS3: 7
CVSS3: 7.8
CVSS2: 7.2
EPSS Низкий

Описание

A vulnerability in unit_deserialize of systemd allows an attacker to supply arbitrary state across systemd re-execution via NotifyAccess. This can be used to improperly influence systemd execution and possibly lead to root privilege escalation. Affected releases are systemd versions up to and including 239.

Ссылки

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
Конфигурация 2
cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*
Версия до 239 (включая)
Конфигурация 3
cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:1.4.0:*:*:*:*:*:*:*

EPSS

Процентиль: 83%
0.0199
Низкий

7 High

CVSS3

7.8 High

CVSS3

7.2 High

CVSS2

Дефекты

CWE-502
CWE-502

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 7 лет назад

A vulnerability in unit_deserialize of systemd allows an attacker to supply arbitrary state across systemd re-execution via NotifyAccess. This can be used to improperly influence systemd execution and possibly lead to root privilege escalation. Affected releases are systemd versions up to and including 239.

CVSS3: 3.6
redhat
почти 7 лет назад

A vulnerability in unit_deserialize of systemd allows an attacker to supply arbitrary state across systemd re-execution via NotifyAccess. This can be used to improperly influence systemd execution and possibly lead to root privilege escalation. Affected releases are systemd versions up to and including 239.

CVSS3: 7.8
msrc
около 5 лет назад

Описание отсутствует

CVSS3: 7.8
debian
почти 7 лет назад

A vulnerability in unit_deserialize of systemd allows an attacker to s ...

CVSS3: 7.8
github
больше 3 лет назад

A vulnerability in unit_deserialize of systemd allows an attacker to supply arbitrary state across systemd re-execution via NotifyAccess. This can be used to improperly influence systemd execution and possibly lead to root privilege escalation. Affected releases are systemd versions up to and including 239.

EPSS

Процентиль: 83%
0.0199
Низкий

7 High

CVSS3

7.8 High

CVSS3

7.2 High

CVSS2

Дефекты

CWE-502
CWE-502