Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-15686

Опубликовано: 26 окт. 2018
Источник: redhat
CVSS3: 3.6
EPSS Низкий

Описание

A vulnerability in unit_deserialize of systemd allows an attacker to supply arbitrary state across systemd re-execution via NotifyAccess. This can be used to improperly influence systemd execution and possibly lead to root privilege escalation. Affected releases are systemd versions up to and including 239.

It was discovered that systemd is vulnerable to a state injection attack when deserializing the state of a service. Properties longer than LINE_MAX are not correctly parsed and an attacker may abuse this flaw in particularly configured services to inject, change, or corrupt the service state.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 8systemdNot affected
Red Hat Ansible Tower 3.4 for RHEL 7ansible-tower-34/ansible-tower-memcachedFixedRHBA-2020:054718.02.2020
Red Hat Ansible Tower 3.4 for RHEL 7ansible-tower-35/ansible-tower-memcachedFixedRHBA-2020:054718.02.2020
Red Hat Ansible Tower 3.4 for RHEL 7ansible-tower-37/ansible-tower-memcached-rhel7FixedRHBA-2020:054718.02.2020
Red Hat Enterprise Linux 7systemdFixedRHSA-2019:209106.08.2019
Red Hat Enterprise Linux 7.4 Advanced Update SupportsystemdFixedRHSA-2020:059325.02.2020
Red Hat Enterprise Linux 7.4 Telco Extended Update SupportsystemdFixedRHSA-2020:059325.02.2020
Red Hat Enterprise Linux 7.4 Update Services for SAP SolutionssystemdFixedRHSA-2020:059325.02.2020
Red Hat Enterprise Linux 7.5 Extended Update SupportsystemdFixedRHSA-2020:126401.04.2020
Red Hat Enterprise Linux 7.6 Extended Update SupportsystemdFixedRHSA-2019:322229.10.2019

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=1639071systemd: line splitting via fgets() allows for state injection during daemon-reexec

EPSS

Процентиль: 83%
0.0199
Низкий

3.6 Low

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 7 лет назад

A vulnerability in unit_deserialize of systemd allows an attacker to supply arbitrary state across systemd re-execution via NotifyAccess. This can be used to improperly influence systemd execution and possibly lead to root privilege escalation. Affected releases are systemd versions up to and including 239.

CVSS3: 7.8
nvd
почти 7 лет назад

A vulnerability in unit_deserialize of systemd allows an attacker to supply arbitrary state across systemd re-execution via NotifyAccess. This can be used to improperly influence systemd execution and possibly lead to root privilege escalation. Affected releases are systemd versions up to and including 239.

CVSS3: 7.8
msrc
около 5 лет назад

Описание отсутствует

CVSS3: 7.8
debian
почти 7 лет назад

A vulnerability in unit_deserialize of systemd allows an attacker to s ...

CVSS3: 7.8
github
больше 3 лет назад

A vulnerability in unit_deserialize of systemd allows an attacker to supply arbitrary state across systemd re-execution via NotifyAccess. This can be used to improperly influence systemd execution and possibly lead to root privilege escalation. Affected releases are systemd versions up to and including 239.

EPSS

Процентиль: 83%
0.0199
Низкий

3.6 Low

CVSS3