cve/2019/CVE-2019-6454.md

19 lines
1006 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2019-6454](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6454)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
An issue was discovered in sd-bus in systemd 239. bus_process_object() in libsystemd/sd-bus/bus-objects.c allocates a variable-length stack buffer for temporarily storing the object path of incoming D-Bus messages. An unprivileged local user can exploit this by sending a specially crafted message to PID1, causing the stack pointer to jump over the stack guard pages into an unmapped memory region and trigger a denial of service (systemd PID1 crash and kernel panic).
### POC
#### Reference
- http://www.openwall.com/lists/oss-security/2021/07/20/2
#### Github
- https://github.com/fbreton/lacework
- https://github.com/flyrev/security-scan-ci-presentation