#VU10365 Race condition in systemd


Published: 2018-02-05

Vulnerability identifier: #VU10365

Vulnerability risk: Low

CVSSv3.1: 5.7 [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-1049

CWE-ID: CWE-362

Exploitation vector: Local network

Exploit availability: No

Vulnerable software:
systemd
Server applications / Other server solutions

Vendor: Freedesktop.org

Description
The vulnerability allows an adjacent attacker to cause DoS condition no the target system.

The weakness exists in GNU systemd due to an error when handling malicious input. An adjacent attacker can submit a specially crafted automount request, trigger race condition and cause the service to crash.

Mitigation
Install update from vendor's website.

Vulnerable software versions

systemd: 227 - 233


External links
http://github.com/systemd/systemd/pull/5916


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability