Improper Input Validation
Affecting systemd package, versions <229-4ubuntu21.27
Report new vulnerabilities
Do your applications use this vulnerable package?
Test your applications
Overview
It was discovered systemd does not correctly check the content of PIDFile files before using it to kill processes. When a service is run from an unprivileged user (e.g. User field set in the service file), a local attacker who is able to write to the PIDFile of the mentioned service may use this flaw to trick systemd into killing other services and/or privileged processes. Versions before v237 are vulnerable.
References
CVSS Score
4.7
low severity
-
Attack VectorLocal
-
Attack ComplexityHigh
-
Privileges RequiredLow
-
User InteractionNone
-
ScopeUnchanged
-
ConfidentialityNone
-
IntegrityNone
-
AvailabilityHigh
- CVE
- CVE-2018-16888
- CWE
- CWE-20 CWE-250 CWE-732
- Snyk ID
- SNYK-UBUNTU1604-SYSTEMD-305137
- Disclosed
- 14 Jan, 2019
- Published
- 03 Jan, 2019