Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2018-15686

Опубликовано: 26 окт. 2018
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 7.2
CVSS3: 7.8

Описание

A vulnerability in unit_deserialize of systemd allows an attacker to supply arbitrary state across systemd re-execution via NotifyAccess. This can be used to improperly influence systemd execution and possibly lead to root privilege escalation. Affected releases are systemd versions up to and including 239.

РелизСтатусПримечание
bionic

released

237-3ubuntu10.6
cosmic

released

239-7ubuntu10.3
devel

released

239-7ubuntu10.3
esm-infra-legacy/trusty

not-affected

binary not built
esm-infra/bionic

released

237-3ubuntu10.6
esm-infra/xenial

released

229-4ubuntu21.8
precise/esm

DNE

trusty

not-affected

binary not built
trusty/esm

not-affected

binary not built
upstream

pending

Показывать по

EPSS

Процентиль: 83%
0.0199
Низкий

7.2 High

CVSS2

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 3.6
redhat
почти 7 лет назад

A vulnerability in unit_deserialize of systemd allows an attacker to supply arbitrary state across systemd re-execution via NotifyAccess. This can be used to improperly influence systemd execution and possibly lead to root privilege escalation. Affected releases are systemd versions up to and including 239.

CVSS3: 7.8
nvd
почти 7 лет назад

A vulnerability in unit_deserialize of systemd allows an attacker to supply arbitrary state across systemd re-execution via NotifyAccess. This can be used to improperly influence systemd execution and possibly lead to root privilege escalation. Affected releases are systemd versions up to and including 239.

CVSS3: 7.8
msrc
около 5 лет назад

Описание отсутствует

CVSS3: 7.8
debian
почти 7 лет назад

A vulnerability in unit_deserialize of systemd allows an attacker to s ...

CVSS3: 7.8
github
больше 3 лет назад

A vulnerability in unit_deserialize of systemd allows an attacker to supply arbitrary state across systemd re-execution via NotifyAccess. This can be used to improperly influence systemd execution and possibly lead to root privilege escalation. Affected releases are systemd versions up to and including 239.

EPSS

Процентиль: 83%
0.0199
Низкий

7.2 High

CVSS2

7.8 High

CVSS3