Vulnerability Description
An out of bounds read was discovered in systemd-journald in the way it parses log messages that terminate with a colon ':'. A local attacker can use this flaw to disclose process memory data. Versions from v221 to v239 are vulnerable.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Systemd Project | Systemd | >= 221, <= 239 |
| Debian | Debian Linux | 9.0 |
| Canonical | Ubuntu Linux | 16.04 |
| Netapp | Active Iq Performance Analytics Services | - |
| Netapp | Element Software | All versions |
| Redhat | Enterprise Linux | 7.6 |
| Redhat | Enterprise Linux Compute Node Eus | 7.6 |
| Redhat | Enterprise Linux Desktop | 7.0 |
| Redhat | Enterprise Linux For Ibm Z Systems \(Structure A\) | 7_s390x |
| Redhat | Enterprise Linux For Ibm Z Systems Eus | 7.6 |
| Redhat | Enterprise Linux For Power Big Endian | 7.0 |
| Redhat | Enterprise Linux For Power Big Endian Eus | 7.6 |
| Redhat | Enterprise Linux For Power Little Endian | 7.0 |
| Redhat | Enterprise Linux For Power Little Endian Eus | 7.6 |
| Redhat | Enterprise Linux For Scientific Computing | 7.0 |
| Redhat | Enterprise Linux Server | 7.0 |
| Redhat | Enterprise Linux Server Aus | 7.4 |
| Redhat | Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions | 7.4 |
| Redhat | Enterprise Linux Server Tus | 7.4 |
| Redhat | Enterprise Linux Server Update Services For Sap Solutions | 7.4 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/152841/System-Down-A-systemd-journald-ExploThird Party AdvisoryVDB Entry
- http://seclists.org/fulldisclosure/2019/May/21Mailing ListThird Party Advisory
- http://www.openwall.com/lists/oss-security/2019/05/10/4Mailing ListThird Party Advisory
- http://www.securityfocus.com/bid/106527Third Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHSA-2019:2091Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:3222Third Party Advisory
- https://access.redhat.com/errata/RHSA-2020:0593Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16866Issue TrackingPatchThird Party Advisory
- https://seclists.org/bugtraq/2019/May/25Mailing ListThird Party Advisory
- https://security.gentoo.org/glsa/201903-07Third Party Advisory
- https://security.netapp.com/advisory/ntap-20190117-0001/Third Party Advisory
- https://usn.ubuntu.com/3855-1/Third Party Advisory
- https://www.debian.org/security/2019/dsa-4367Third Party Advisory
- https://www.qualys.com/2019/01/09/system-down/system-down.txtExploitThird Party Advisory
- http://packetstormsecurity.com/files/152841/System-Down-A-systemd-journald-ExploThird Party AdvisoryVDB Entry
FAQ
What is CVE-2018-16866?
CVE-2018-16866 is a vulnerability with a CVSS score of 3.3 (LOW). An out of bounds read was discovered in systemd-journald in the way it parses log messages that terminate with a colon ':'. A local attacker can use this flaw to disclose process memory data. Versions...
How severe is CVE-2018-16866?
CVE-2018-16866 has been rated LOW with a CVSS base score of 3.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-16866?
Check the references section above for vendor advisories and patch information. Affected products include: Systemd Project Systemd, Debian Debian Linux, Canonical Ubuntu Linux, Netapp Active Iq Performance Analytics Services, Netapp Element Software.