mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-06 18:52:12 +00:00
24 lines
1.3 KiB
Markdown
24 lines
1.3 KiB
Markdown
![]() |
### [CVE-2018-15686](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15686)
|
||
|

|
||
|

|
||
|
%20can%20be%20confused%20by%20overly-long%20input%20strings.%20The%20first%20read%20will%20return%20a%20partial%20string%20and%20subsequent%20reads%20will%20begin%20as%20if%20it%20were%20a%20new%20line.&color=brighgreen)
|
||
|
|
||
|
### Description
|
||
|
|
||
|
A vulnerability in unit_deserialize of systemd allows an attacker to supply arbitrary state across systemd re-execution via NotifyAccess. This can be used to improperly influence systemd execution and possibly lead to root privilege escalation. Affected releases are systemd versions up to and including 239.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- https://www.exploit-db.com/exploits/45714/
|
||
|
- https://www.oracle.com//security-alerts/cpujul2021.html
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/0xT11/CVE-POC
|
||
|
- https://github.com/flyrev/security-scan-ci-presentation
|
||
|
- https://github.com/hpcprofessional/remediate_cesa_2019_2091
|
||
|
- https://github.com/kiseru-io/clair-sec-scanner
|
||
|
- https://github.com/lacework/up-and-running-packer
|
||
|
- https://github.com/scottford-lw/up-and-running-packer
|
||
|
|