Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-15688

Опубликовано: 26 окт. 2018
Источник: redhat
CVSS3: 8.8
EPSS Низкий

Описание

A buffer overflow vulnerability in the dhcp6 client of systemd allows a malicious dhcp6 server to overwrite heap memory in systemd-networkd. Affected releases are systemd: versions up to and including 239.

It was discovered that systemd-network does not correctly keep track of a buffer size when constructing DHCPv6 packets. This flaw may lead to an integer underflow that can be used to produce an heap-based buffer overflow. A malicious host on the same network segment as the victim's one may advertise itself as a DHCPv6 server and exploit this flaw to cause a Denial of Service or potentially gain code execution on the victim's machine.

Отчет

This issue affects the versions of systemd-networkd as shipped with Red Hat Enterprise Linux 7, however the package is available only through the unsupported Optional repository and it cannot be exploited unless the interface is explicitly configured to use DHCP. This issue affects the versions of NetworkManager as shipped with Red Hat Enterprise Linux 7 because the package includes some parts of the systemd-networkd code, which present the same vulnerability. NetworkManager is vulnerable to this flaw only when configured to use the internal DHCP, which is not the default. However, when it is, the flaw may be triggered by a connection where either ipv6.method is set to dhcp or it is set to auto, which is the default value.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5NetworkManagerNot affected
Red Hat Enterprise Linux 6NetworkManagerNot affected
Red Hat Enterprise Linux 8NetworkManagerNot affected
Red Hat Enterprise Linux 8systemdNot affected
Red Hat Virtualization 4redhat-virtualization-hostNot affected
Red Hat Virtualization 4rhvm-applianceNot affected
Red Hat Enterprise Linux 7NetworkManagerFixedRHSA-2018:366527.11.2018
Red Hat Enterprise Linux 7systemdFixedRHSA-2019:004914.01.2019

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-131->CWE-190->CWE-122
https://bugzilla.redhat.com/show_bug.cgi?id=1639067systemd: Out-of-bounds heap write in systemd-networkd dhcpv6 option handling

EPSS

Процентиль: 74%
0.00829
Низкий

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
ubuntu
почти 7 лет назад

A buffer overflow vulnerability in the dhcp6 client of systemd allows a malicious dhcp6 server to overwrite heap memory in systemd-networkd. Affected releases are systemd: versions up to and including 239.

CVSS3: 8.8
nvd
почти 7 лет назад

A buffer overflow vulnerability in the dhcp6 client of systemd allows a malicious dhcp6 server to overwrite heap memory in systemd-networkd. Affected releases are systemd: versions up to and including 239.

CVSS3: 8.8
msrc
около 5 лет назад

Описание отсутствует

CVSS3: 8.8
debian
почти 7 лет назад

A buffer overflow vulnerability in the dhcp6 client of systemd allows ...

CVSS3: 8.8
github
больше 3 лет назад

A buffer overflow vulnerability in the dhcp6 client of systemd allows a malicious dhcp6 server to overwrite heap memory in systemd-networkd. Affected releases are systemd: versions up to and including 239.

EPSS

Процентиль: 74%
0.00829
Низкий

8.8 High

CVSS3