Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-16865

Опубликовано: 09 янв. 2019
Источник: redhat
CVSS3: 7.5

Описание

An allocation of memory without limits, that could result in the stack clashing with another memory region, was discovered in systemd-journald when many entries are sent to the journal socket. A local attacker, or a remote one if systemd-journal-remote is used, may use this flaw to crash systemd-journald or execute code with journald privileges. Versions through v240 are vulnerable.

An allocation of memory without limits, that could result in the stack clashing with another memory region, was discovered in systemd-journald when many entries are sent to the journal socket. A local attacker, or a remote one if systemd-journal-remote is used, may use this flaw to crash systemd-journald or execute code with journald privileges.

Отчет

This issue affects the versions of systemd as shipped with Red Hat Enterprise Linux 7. Red Hat Product Security has rated this issue as having a security impact of Important because it allows an attacker to crash systemd-journald or escalate his privileges. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/. Red Hat Enterprise Linux 7 ships systemd-journal-remote through the optional systemd-journal-gateway package, which is not installed, nor enabled by default.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 8systemdNot affected
Red Hat Enterprise Linux 7systemdFixedRHSA-2019:004914.01.2019
Red Hat Enterprise Linux 7.3 Advanced Update SupportsystemdFixedRHSA-2019:240207.08.2019
Red Hat Enterprise Linux 7.3 Telco Extended Update SupportsystemdFixedRHSA-2019:240207.08.2019
Red Hat Enterprise Linux 7.3 Update Services for SAP SolutionssystemdFixedRHSA-2019:240207.08.2019
Red Hat Enterprise Linux 7.4 Extended Update SupportsystemdFixedRHSA-2019:027104.02.2019
Red Hat Enterprise Linux 7.5 Extended Update SupportsystemdFixedRHSA-2019:020429.01.2019
Red Hat Virtualization 4 for Red Hat Enterprise Linux 7redhat-release-virtualization-hostFixedRHSA-2019:034213.02.2019
Red Hat Virtualization 4 for Red Hat Enterprise Linux 7redhat-virtualization-hostFixedRHSA-2019:034213.02.2019
Red Hat Virtualization 4 for Red Hat Enterprise Linux 7rhvm-applianceFixedRHSA-2019:036118.02.2019

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-770
https://bugzilla.redhat.com/show_bug.cgi?id=1653861systemd: stack overflow when receiving many journald entries

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 6 лет назад

An allocation of memory without limits, that could result in the stack clashing with another memory region, was discovered in systemd-journald when many entries are sent to the journal socket. A local attacker, or a remote one if systemd-journal-remote is used, may use this flaw to crash systemd-journald or execute code with journald privileges. Versions through v240 are vulnerable.

CVSS3: 7.8
nvd
больше 6 лет назад

An allocation of memory without limits, that could result in the stack clashing with another memory region, was discovered in systemd-journald when many entries are sent to the journal socket. A local attacker, or a remote one if systemd-journal-remote is used, may use this flaw to crash systemd-journald or execute code with journald privileges. Versions through v240 are vulnerable.

CVSS3: 7.8
msrc
около 5 лет назад

Описание отсутствует

CVSS3: 7.8
debian
больше 6 лет назад

An allocation of memory without limits, that could result in the stack ...

CVSS3: 7.8
github
больше 3 лет назад

An allocation of memory without limits, that could result in the stack clashing with another memory region, was discovered in systemd-journald when many entries are sent to the journal socket. A local attacker, or a remote one if systemd-journal-remote is used, may use this flaw to crash systemd-journald or execute code with journald privileges. Versions through v240 are vulnerable.

7.5 High

CVSS3