HIGH · 7.8

CVE-2019-3843

It was discovered that a systemd service that uses DynamicUser property can create a SUID/SGID binary that would be allowed to run as the transient service UID/GID even after the service is terminated...

Vulnerability Description

It was discovered that a systemd service that uses DynamicUser property can create a SUID/SGID binary that would be allowed to run as the transient service UID/GID even after the service is terminated. A local attacker may use this flaw to access resources that will be owned by a potentially different service in the future, when the UID/GID will be recycled.

CVSS Score

7.8

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
Systemd ProjectSystemd< 242
FedoraprojectFedora30
CanonicalUbuntu Linux16.04
NetappHci Management Node-
NetappSnapprotect-
NetappSolidfire-
NetappCn1610 Firmware-
NetappCn1610-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2019-3843?

CVE-2019-3843 is a vulnerability with a CVSS score of 7.8 (HIGH). It was discovered that a systemd service that uses DynamicUser property can create a SUID/SGID binary that would be allowed to run as the transient service UID/GID even after the service is terminated...

How severe is CVE-2019-3843?

CVE-2019-3843 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2019-3843?

Check the references section above for vendor advisories and patch information. Affected products include: Systemd Project Systemd, Fedoraproject Fedora, Canonical Ubuntu Linux, Netapp Hci Management Node, Netapp Snapprotect.