Описание
In systemd 240, bus_open_system_watch_bind_with_description in shared/bus-util.c (as used by systemd-resolved to connect to the system D-Bus instance), calls sd_bus_set_trusted, which disables access controls for incoming D-Bus messages. An unprivileged user can exploit this by executing D-Bus methods that should be restricted to privileged users, in order to change the system's DNS resolver settings.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | released | 237-3ubuntu10.28 |
| devel | released | 242-7 |
| disco | released | 240-6ubuntu5.6 |
| esm-infra-legacy/trusty | not-affected | |
| esm-infra/bionic | released | 237-3ubuntu10.28 |
| esm-infra/xenial | not-affected | |
| precise/esm | DNE | |
| trusty | ignored | end of standard support |
| trusty/esm | not-affected | |
| upstream | released | 243 |
Показывать по
EPSS
3.6 Low
CVSS2
4.4 Medium
CVSS3
Связанные уязвимости
In systemd 240, bus_open_system_watch_bind_with_description in shared/bus-util.c (as used by systemd-resolved to connect to the system D-Bus instance), calls sd_bus_set_trusted, which disables access controls for incoming D-Bus messages. An unprivileged user can exploit this by executing D-Bus methods that should be restricted to privileged users, in order to change the system's DNS resolver settings.
In systemd 240, bus_open_system_watch_bind_with_description in shared/bus-util.c (as used by systemd-resolved to connect to the system D-Bus instance), calls sd_bus_set_trusted, which disables access controls for incoming D-Bus messages. An unprivileged user can exploit this by executing D-Bus methods that should be restricted to privileged users, in order to change the system's DNS resolver settings.
In systemd 240, bus_open_system_watch_bind_with_description in shared/ ...
In systemd 240, bus_open_system_watch_bind_with_description in shared/bus-util.c (as used by systemd-resolved to connect to the system D-Bus instance), calls sd_bus_set_trusted, which disables access controls for incoming D-Bus messages. An unprivileged user can exploit this by executing D-Bus methods that should be restricted to privileged users, in order to change the system's DNS resolver settings.
ELSA-2019-3592: systemd security, bug fix, and enhancement update (MODERATE)
EPSS
3.6 Low
CVSS2
4.4 Medium
CVSS3