Improper Input Validation

Affecting systemd package, versions <229-4ubuntu21.27

Report new vulnerabilities
Do your applications use this vulnerable package? Test your applications

Overview

It was discovered systemd does not correctly check the content of PIDFile files before using it to kill processes. When a service is run from an unprivileged user (e.g. User field set in the service file), a local attacker who is able to write to the PIDFile of the mentioned service may use this flaw to trick systemd into killing other services and/or privileged processes. Versions before v237 are vulnerable.

References

CVSS Score

4.7
low severity
  • Attack Vector
    Local
  • Attack Complexity
    High
  • Privileges Required
    Low
  • User Interaction
    None
  • Scope
    Unchanged
  • Confidentiality
    None
  • Integrity
    None
  • Availability
    High
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE
CVE-2018-16888
CWE
CWE-20 CWE-250 CWE-732
Snyk ID
SNYK-UBUNTU1604-SYSTEMD-305137
Disclosed
14 Jan, 2019
Published
03 Jan, 2019