MEDIUM · 4.7

CVE-2018-16888

It was discovered systemd does not correctly check the content of PIDFile files before using it to kill processes. When a service is run from an unprivileged user (e.g. User field set in the service f...

Vulnerability Description

It was discovered systemd does not correctly check the content of PIDFile files before using it to kill processes. When a service is run from an unprivileged user (e.g. User field set in the service file), a local attacker who is able to write to the PIDFile of the mentioned service may use this flaw to trick systemd into killing other services and/or privileged processes. Versions before v237 are vulnerable.

CVSS Score

4.7

MEDIUM

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
NONE
Integrity
NONE
Availability
HIGH

Affected Products

VendorProductVersions
Systemd ProjectSystemd< 237
CanonicalUbuntu Linux16.04
RedhatEnterprise Linux7.0
NetappActive Iq Performance Analytics Services-
NetappElement Software-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2018-16888?

CVE-2018-16888 is a vulnerability with a CVSS score of 4.7 (MEDIUM). It was discovered systemd does not correctly check the content of PIDFile files before using it to kill processes. When a service is run from an unprivileged user (e.g. User field set in the service f...

How severe is CVE-2018-16888?

CVE-2018-16888 has been rated MEDIUM with a CVSS base score of 4.7/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2018-16888?

Check the references section above for vendor advisories and patch information. Affected products include: Systemd Project Systemd, Canonical Ubuntu Linux, Redhat Enterprise Linux, Netapp Active Iq Performance Analytics Services, Netapp Element Software.