Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-16866

Опубликовано: 09 янв. 2019
Источник: redhat
CVSS3: 4.3

Описание

An out of bounds read was discovered in systemd-journald in the way it parses log messages that terminate with a colon ':'. A local attacker can use this flaw to disclose process memory data. Versions from v221 to v239 are vulnerable.

An out of bounds read was discovered in systemd-journald in the way it parses log messages that terminate with a colon ':'. A local attacker can use this flaw to disclose process memory data.

Отчет

This issue affects the versions of systemd as shipped with Red Hat Enterprise Linux 7. Red Hat Product Security has rated this issue as having a security impact of Moderate. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/. Red Hat Virtualization Hypervisor and Management Appliance include vulnerable versions of systemd. However, since exploitation requires local access and impact is restricted to information disclosure, this flaw is rated as having a security issue of Low. Future updates may address this issue.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 8systemdNot affected
Red Hat Virtualization 4redhat-virtualization-hostWill not fix
Red Hat Virtualization 4rhvm-applianceWill not fix
Red Hat Ansible Tower 3.4 for RHEL 7ansible-tower-34/ansible-tower-memcachedFixedRHBA-2020:054718.02.2020
Red Hat Ansible Tower 3.4 for RHEL 7ansible-tower-35/ansible-tower-memcachedFixedRHBA-2020:054718.02.2020
Red Hat Ansible Tower 3.4 for RHEL 7ansible-tower-37/ansible-tower-memcached-rhel7FixedRHBA-2020:054718.02.2020
Red Hat Enterprise Linux 7systemdFixedRHSA-2019:209106.08.2019
Red Hat Enterprise Linux 7.4 Advanced Update SupportsystemdFixedRHSA-2020:059325.02.2020
Red Hat Enterprise Linux 7.4 Telco Extended Update SupportsystemdFixedRHSA-2020:059325.02.2020
Red Hat Enterprise Linux 7.4 Update Services for SAP SolutionssystemdFixedRHSA-2020:059325.02.2020

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-125->CWE-200
https://bugzilla.redhat.com/show_bug.cgi?id=1653867systemd: out-of-bounds read when parsing a crafted syslog message

4.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 3.3
ubuntu
больше 6 лет назад

An out of bounds read was discovered in systemd-journald in the way it parses log messages that terminate with a colon ':'. A local attacker can use this flaw to disclose process memory data. Versions from v221 to v239 are vulnerable.

CVSS3: 3.3
nvd
больше 6 лет назад

An out of bounds read was discovered in systemd-journald in the way it parses log messages that terminate with a colon ':'. A local attacker can use this flaw to disclose process memory data. Versions from v221 to v239 are vulnerable.

CVSS3: 3.3
msrc
около 5 лет назад

Описание отсутствует

CVSS3: 3.3
debian
больше 6 лет назад

An out of bounds read was discovered in systemd-journald in the way it ...

CVSS3: 3.3
github
больше 3 лет назад

An out of bounds read was discovered in systemd-journald in the way it parses log messages that terminate with a colon ':'. A local attacker can use this flaw to disclose process memory data. Versions from v221 to v239 are vulnerable.

4.3 Medium

CVSS3