Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2019-15718

Опубликовано: 04 сент. 2019
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 3.6
CVSS3: 4.4

Описание

In systemd 240, bus_open_system_watch_bind_with_description in shared/bus-util.c (as used by systemd-resolved to connect to the system D-Bus instance), calls sd_bus_set_trusted, which disables access controls for incoming D-Bus messages. An unprivileged user can exploit this by executing D-Bus methods that should be restricted to privileged users, in order to change the system's DNS resolver settings.

РелизСтатусПримечание
bionic

released

237-3ubuntu10.28
devel

released

242-7
disco

released

240-6ubuntu5.6
esm-infra-legacy/trusty

not-affected

esm-infra/bionic

released

237-3ubuntu10.28
esm-infra/xenial

not-affected

precise/esm

DNE

trusty

ignored

end of standard support
trusty/esm

not-affected

upstream

released

243

Показывать по

EPSS

Процентиль: 29%
0.00105
Низкий

3.6 Low

CVSS2

4.4 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
redhat
больше 6 лет назад

In systemd 240, bus_open_system_watch_bind_with_description in shared/bus-util.c (as used by systemd-resolved to connect to the system D-Bus instance), calls sd_bus_set_trusted, which disables access controls for incoming D-Bus messages. An unprivileged user can exploit this by executing D-Bus methods that should be restricted to privileged users, in order to change the system's DNS resolver settings.

CVSS3: 4.4
nvd
больше 6 лет назад

In systemd 240, bus_open_system_watch_bind_with_description in shared/bus-util.c (as used by systemd-resolved to connect to the system D-Bus instance), calls sd_bus_set_trusted, which disables access controls for incoming D-Bus messages. An unprivileged user can exploit this by executing D-Bus methods that should be restricted to privileged users, in order to change the system's DNS resolver settings.

CVSS3: 4.4
debian
больше 6 лет назад

In systemd 240, bus_open_system_watch_bind_with_description in shared/ ...

github
больше 3 лет назад

In systemd 240, bus_open_system_watch_bind_with_description in shared/bus-util.c (as used by systemd-resolved to connect to the system D-Bus instance), calls sd_bus_set_trusted, which disables access controls for incoming D-Bus messages. An unprivileged user can exploit this by executing D-Bus methods that should be restricted to privileged users, in order to change the system's DNS resolver settings.

oracle-oval
около 6 лет назад

ELSA-2019-3592: systemd security, bug fix, and enhancement update (MODERATE)

EPSS

Процентиль: 29%
0.00105
Низкий

3.6 Low

CVSS2

4.4 Medium

CVSS3