Allocation of Resources Without Limits or Throttling
Affecting systemd package, versions <232-25+deb9u7
Report new vulnerabilities
Do your applications use this vulnerable package?
Test your applications
Overview
An allocation of memory without limits, that could result in the stack clashing with another memory region, was discovered in systemd-journald when a program with long command line arguments calls syslog. A local attacker may use this flaw to crash systemd-journald or escalate his privileges. Versions through v240 are vulnerable.
References
- Debian Security Advisory
- Debian Security Announcement
- Debian Security Tracker
- Gentoo Security Advisory
- MISC
- Netapp Security Advisory
- Oracle Security Advisory
- REDHAT
- RHSA Security Advisory
- RHSA Security Advisory
- RHSA Security Advisory
- RHSA Security Advisory
- RHSA Security Advisory
- RHSA Security Advisory
- RedHat Bugzilla Bug
- Security Focus
- Ubuntu CVE Tracker
- Ubuntu Security Advisory
CVSS Score
7.8
high severity
-
Attack VectorLocal
-
Attack ComplexityLow
-
Privileges RequiredLow
-
User InteractionNone
-
ScopeUnchanged
-
ConfidentialityHigh
-
IntegrityHigh
-
AvailabilityHigh
- CVE
- CVE-2018-16864
- CWE
- CWE-770
- Snyk ID
- SNYK-DEBIAN9-SYSTEMD-305082
- Disclosed
- 11 Jan, 2019
- Published
- 11 Jan, 2019