LOW · 3.3

CVE-2018-16866

An out of bounds read was discovered in systemd-journald in the way it parses log messages that terminate with a colon ':'. A local attacker can use this flaw to disclose process memory data. Versions...

Vulnerability Description

An out of bounds read was discovered in systemd-journald in the way it parses log messages that terminate with a colon ':'. A local attacker can use this flaw to disclose process memory data. Versions from v221 to v239 are vulnerable.

CVSS Score

3.3

LOW

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
LOW
Integrity
NONE
Availability
NONE

Affected Products

VendorProductVersions
Systemd ProjectSystemd>= 221, <= 239
DebianDebian Linux9.0
CanonicalUbuntu Linux16.04
NetappActive Iq Performance Analytics Services-
NetappElement SoftwareAll versions
RedhatEnterprise Linux7.6
RedhatEnterprise Linux Compute Node Eus7.6
RedhatEnterprise Linux Desktop7.0
RedhatEnterprise Linux For Ibm Z Systems \(Structure A\)7_s390x
RedhatEnterprise Linux For Ibm Z Systems Eus7.6
RedhatEnterprise Linux For Power Big Endian7.0
RedhatEnterprise Linux For Power Big Endian Eus7.6
RedhatEnterprise Linux For Power Little Endian7.0
RedhatEnterprise Linux For Power Little Endian Eus7.6
RedhatEnterprise Linux For Scientific Computing7.0
RedhatEnterprise Linux Server7.0
RedhatEnterprise Linux Server Aus7.4
RedhatEnterprise Linux Server For Power Little Endian Update Services For Sap Solutions7.4
RedhatEnterprise Linux Server Tus7.4
RedhatEnterprise Linux Server Update Services For Sap Solutions7.4

Related Weaknesses (CWE)

References

FAQ

What is CVE-2018-16866?

CVE-2018-16866 is a vulnerability with a CVSS score of 3.3 (LOW). An out of bounds read was discovered in systemd-journald in the way it parses log messages that terminate with a colon ':'. A local attacker can use this flaw to disclose process memory data. Versions...

How severe is CVE-2018-16866?

CVE-2018-16866 has been rated LOW with a CVSS base score of 3.3/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2018-16866?

Check the references section above for vendor advisories and patch information. Affected products include: Systemd Project Systemd, Debian Debian Linux, Canonical Ubuntu Linux, Netapp Active Iq Performance Analytics Services, Netapp Element Software.