cve/2018/CVE-2018-16865.md

23 lines
1.2 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2018-16865](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16865)
![](https://img.shields.io/static/v1?label=Product&message=systemd&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20through%20v240%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-770&color=brighgreen)
### Description
An allocation of memory without limits, that could result in the stack clashing with another memory region, was discovered in systemd-journald when many entries are sent to the journal socket. A local attacker, or a remote one if systemd-journal-remote is used, may use this flaw to crash systemd-journald or execute code with journald privileges. Versions through v240 are vulnerable.
### POC
#### Reference
- http://packetstormsecurity.com/files/152841/System-Down-A-systemd-journald-Exploit.html
- http://www.openwall.com/lists/oss-security/2021/07/20/2
- https://www.qualys.com/2019/01/09/system-down/system-down.txt
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/fbreton/lacework
- https://github.com/lacework/up-and-running-packer
- https://github.com/scottford-lw/up-and-running-packer