Out-of-Bounds

Affecting systemd package, versions <232-25+deb9u9

Report new vulnerabilities
Do your applications use this vulnerable package? Test your applications

Overview

An issue was discovered in sd-bus in systemd 239. bus_process_object() in libsystemd/sd-bus/bus-objects.c allocates a variable-length stack buffer for temporarily storing the object path of incoming D-Bus messages. An unprivileged local user can exploit this by sending a specially crafted message to PID1, causing the stack pointer to jump over the stack guard pages into an unmapped memory region and trigger a denial of service (systemd PID1 crash and kernel panic).

References

CVSS Score

5.5
medium severity
  • Attack Vector
    Local
  • Attack Complexity
    Low
  • Privileges Required
    Low
  • User Interaction
    None
  • Scope
    Unchanged
  • Confidentiality
    None
  • Integrity
    None
  • Availability
    High
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE
CVE-2019-6454
CWE
CWE-119
Snyk ID
SNYK-DEBIAN9-SYSTEMD-337525
Disclosed
21 Mar, 2019
Published
19 Feb, 2019