Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-16864

Опубликовано: 09 янв. 2019
Источник: redhat
CVSS3: 7.4
EPSS Низкий

Описание

An allocation of memory without limits, that could result in the stack clashing with another memory region, was discovered in systemd-journald when a program with long command line arguments calls syslog. A local attacker may use this flaw to crash systemd-journald or escalate his privileges. Versions through v240 are vulnerable.

An allocation of memory without limits, that could result in the stack clashing with another memory region, was discovered in systemd-journald when a program with long command line arguments calls syslog. A local attacker may use this flaw to crash systemd-journald or escalate privileges.

Отчет

This issue affects the versions of systemd as shipped with Red Hat Enterprise Linux 7. Red Hat Product Security has rated this issue as having a security impact of Important because it allows a local attacker to crash systemd-journald or escalate his privileges. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

Меры по смягчению последствий

To increase the time an attacker needs to exploit this flaw you could override the StartLimitInterval= (called StartLimitIntervalSec in newer systemd versions) and StartLimitBurst= settings. In this way the attack may require much longer to be successful. To edit the journald service use sudo systemctl edit systemd-journald.service and add:

[Service] StartLimitInterval=120 StartLimitBurst=3

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 8systemdNot affected
Red Hat Enterprise Linux 7systemdFixedRHSA-2019:004914.01.2019
Red Hat Enterprise Linux 7.3 Advanced Update SupportsystemdFixedRHSA-2019:240207.08.2019
Red Hat Enterprise Linux 7.3 Telco Extended Update SupportsystemdFixedRHSA-2019:240207.08.2019
Red Hat Enterprise Linux 7.3 Update Services for SAP SolutionssystemdFixedRHSA-2019:240207.08.2019
Red Hat Enterprise Linux 7.4 Extended Update SupportsystemdFixedRHSA-2019:027104.02.2019
Red Hat Enterprise Linux 7.5 Extended Update SupportsystemdFixedRHSA-2019:020429.01.2019
Red Hat Virtualization 4 for Red Hat Enterprise Linux 7redhat-release-virtualization-hostFixedRHSA-2019:034213.02.2019
Red Hat Virtualization 4 for Red Hat Enterprise Linux 7redhat-virtualization-hostFixedRHSA-2019:034213.02.2019
Red Hat Virtualization 4 for Red Hat Enterprise Linux 7rhvm-applianceFixedRHSA-2019:036118.02.2019

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-770
https://bugzilla.redhat.com/show_bug.cgi?id=1653855systemd: stack overflow when calling syslog from a command with long cmdline

EPSS

Процентиль: 36%
0.0015
Низкий

7.4 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 6 лет назад

An allocation of memory without limits, that could result in the stack clashing with another memory region, was discovered in systemd-journald when a program with long command line arguments calls syslog. A local attacker may use this flaw to crash systemd-journald or escalate his privileges. Versions through v240 are vulnerable.

CVSS3: 7.8
nvd
больше 6 лет назад

An allocation of memory without limits, that could result in the stack clashing with another memory region, was discovered in systemd-journald when a program with long command line arguments calls syslog. A local attacker may use this flaw to crash systemd-journald or escalate his privileges. Versions through v240 are vulnerable.

CVSS3: 7.8
msrc
около 5 лет назад

Описание отсутствует

CVSS3: 7.8
debian
больше 6 лет назад

An allocation of memory without limits, that could result in the stack ...

CVSS3: 7.8
github
больше 3 лет назад

An allocation of memory without limits, that could result in the stack clashing with another memory region, was discovered in systemd-journald when a program with long command line arguments calls syslog. A local attacker may use this flaw to crash systemd-journald or escalate his privileges. Versions through v240 are vulnerable.

EPSS

Процентиль: 36%
0.0015
Низкий

7.4 High

CVSS3