SB2019011413 - Red Hat update for systemd



SB2019011413 - Red Hat update for systemd

Published: January 14, 2019 Updated: March 28, 2023

Security Bulletin ID SB2019011413
Severity
High
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 33% Low 67%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Heap out-of-bounds write (CVE-ID: CVE-2018-15688)

The vulnerability allows a remote attacker to cause DoS condition or execute arbitrary code with elevated privileges.

The weakness exists within the written-from-scratch DHCPv6 client of the open-source Systemd management suite due to an out-of-bounds heap write in the DHCPv6 client when handling options sent by network adjacent DHCP servers. A remote attacker can supply maliciously crafted DHCPv6 packets, exploit the programming cockup, arbitrarily change parts of memory to crash or execute arbitrary code on the vulnerable Systemd-powered Linux machines.


2) Memory corruption (CVE-ID: CVE-2018-16864)

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The weakness exists due to boundary error when handling malicious input. A local attacker can run a specially crafted application, trigger memory corruption and gain elevated privileges to conduct further attacks.

3) Memory corruption (CVE-ID: CVE-2018-16865)

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The weakness exists due to boundary error when handling malicious input. A local attacker can run a specially crafted application, trigger memory corruption and gain elevated privileges to conduct further attacks.

Remediation

Install update from vendor's website.