CVE Vulnerabilities

CVE-2018-16888

Improper Privilege Management

Published: Jan 14, 2019 | Modified: Nov 07, 2023
CVSS 3.x
4.7
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
1.9 LOW
AV:L/AC:M/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
4.4 LOW
CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H
Ubuntu
LOW

It was discovered systemd does not correctly check the content of PIDFile files before using it to kill processes. When a service is run from an unprivileged user (e.g. User field set in the service file), a local attacker who is able to write to the PIDFile of the mentioned service may use this flaw to trick systemd into killing other services and/or privileged processes. Versions before v237 are vulnerable.

Weakness

The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.

Affected Software

Name Vendor Start Version End Version
Systemd Systemd_project * 237 (excluding)
Red Hat Ansible Tower 3.4 for RHEL 7 RedHat ansible-tower-34/ansible-tower-memcached:1.4.15-28 *
Red Hat Ansible Tower 3.4 for RHEL 7 RedHat ansible-tower-35/ansible-tower-memcached:1.4.15-28 *
Red Hat Ansible Tower 3.4 for RHEL 7 RedHat ansible-tower-37/ansible-tower-memcached-rhel7:1.4.15-28 *
Red Hat Enterprise Linux 7 RedHat systemd-0:219-67.el7 *
Systemd Ubuntu upstream *
Systemd Ubuntu xenial *

Potential Mitigations

References