Vulnerability Name: | CVE-2018-16888 (CCN-155559) | ||||||||||||||||||||||||||||||||||||
Assigned: | 2017-08-17 | ||||||||||||||||||||||||||||||||||||
Published: | 2017-08-17 | ||||||||||||||||||||||||||||||||||||
Updated: | 2022-01-31 | ||||||||||||||||||||||||||||||||||||
Summary: | It was discovered systemd does not correctly check the content of PIDFile files before using it to kill processes. When a service is run from an unprivileged user (e.g. User field set in the service file), a local attacker who is able to write to the PIDFile of the mentioned service may use this flaw to trick systemd into killing other services and/or privileged processes. Versions before v237 are vulnerable. | ||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 4.7 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) 4.1 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
6.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
3.9 Low (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 1.9 Low (CVSS v2 Vector: AV:L/AC:M/Au:N/C:N/I:N/A:P)
| ||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-269 CWE-250 | ||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2018-16888 Source: REDHAT Type: Third Party Advisory RHSA-2019:2091 Source: CCN Type: Red Hat Bugzilla Bug 1662867 (CVE-2018-16888) - CVE-2018-16888 systemd: kills privileged process if unprivileged PIDFile was tampered Source: CONFIRM Type: Issue Tracking, Patch, Third Party Advisory https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16888 Source: XF Type: UNKNOWN systemd-cve201816888-priv-esc(155559) Source: CCN Type: systemd GIT Repository Make MAINPID= and PIDFile= handling more restrictive (and other stuff) #7816 Source: MLIST Type: Third Party Advisory [cassandra-user] 20190809 cassandra does not start with new systemd version Source: CONFIRM Type: Third Party Advisory https://security.netapp.com/advisory/ntap-20190307-0007/ Source: UBUNTU Type: Third Party Advisory USN-4269-1 Source: CCN Type: WhiteSource Vulnerability Database CVE-2018-16888 | ||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration RedHat 4: Configuration RedHat 5: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||
BACK |