Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-3844

Опубликовано: 25 апр. 2019
Источник: redhat
CVSS3: 4.5
EPSS Низкий

Описание

It was discovered that a systemd service that uses DynamicUser property can get new privileges through the execution of SUID binaries, which would allow to create binaries owned by the service transient group with the setgid bit set. A local attacker may use this flaw to access resources that will be owned by a potentially different service in the future, when the GID will be recycled.

It was discovered that a systemd service that uses DynamicUser property can get new privileges through the execution of SUID binaries, which would allow a cooperating process to create binaries owned by the service transient group with the setgid bit set. A local attacker may use this flaw to access resources that will be owned by a potentially different service in the future when the GID will be recycled.

Отчет

This issue did not affect the versions of systemd as shipped with Red Hat Enterprise Linux 7 as they did not include support for DynamicUser property.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 7systemdNot affected
Red Hat Enterprise Linux 8systemdFixedRHSA-2020:179428.04.2020

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-268
https://bugzilla.redhat.com/show_bug.cgi?id=1684610systemd: services with DynamicUser can get new privileges and create SGID binaries

EPSS

Процентиль: 37%
0.0016
Низкий

4.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 7 лет назад

It was discovered that a systemd service that uses DynamicUser property can get new privileges through the execution of SUID binaries, which would allow to create binaries owned by the service transient group with the setgid bit set. A local attacker may use this flaw to access resources that will be owned by a potentially different service in the future, when the GID will be recycled.

CVSS3: 7.8
nvd
почти 7 лет назад

It was discovered that a systemd service that uses DynamicUser property can get new privileges through the execution of SUID binaries, which would allow to create binaries owned by the service transient group with the setgid bit set. A local attacker may use this flaw to access resources that will be owned by a potentially different service in the future, when the GID will be recycled.

CVSS3: 7.8
msrc
больше 5 лет назад

Описание отсутствует

CVSS3: 7.8
debian
почти 7 лет назад

It was discovered that a systemd service that uses DynamicUser propert ...

CVSS3: 7.8
github
больше 3 лет назад

It was discovered that a systemd service that uses DynamicUser property can get new privileges through the execution of SUID binaries, which would allow to create binaries owned by the service transient group with the setgid bit set. A local attacker may use this flaw to access resources that will be owned by a potentially different service in the future, when the GID will be recycled.

EPSS

Процентиль: 37%
0.0016
Низкий

4.5 Medium

CVSS3