cve/2018/CVE-2018-15686.md

24 lines
1.3 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2018-15686](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15686)
![](https://img.shields.io/static/v1?label=Product&message=systemd&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=fgets()%20can%20be%20confused%20by%20overly-long%20input%20strings.%20The%20first%20read%20will%20return%20a%20partial%20string%20and%20subsequent%20reads%20will%20begin%20as%20if%20it%20were%20a%20new%20line.&color=brighgreen)
### Description
A vulnerability in unit_deserialize of systemd allows an attacker to supply arbitrary state across systemd re-execution via NotifyAccess. This can be used to improperly influence systemd execution and possibly lead to root privilege escalation. Affected releases are systemd versions up to and including 239.
### POC
#### Reference
- https://www.exploit-db.com/exploits/45714/
- https://www.oracle.com//security-alerts/cpujul2021.html
#### Github
- https://github.com/0xT11/CVE-POC
- https://github.com/flyrev/security-scan-ci-presentation
- https://github.com/hpcprofessional/remediate_cesa_2019_2091
- https://github.com/kiseru-io/clair-sec-scanner
- https://github.com/lacework/up-and-running-packer
- https://github.com/scottford-lw/up-and-running-packer