HIGH · 7.8

CVE-2019-3844

It was discovered that a systemd service that uses DynamicUser property can get new privileges through the execution of SUID binaries, which would allow to create binaries owned by the service transie...

Vulnerability Description

It was discovered that a systemd service that uses DynamicUser property can get new privileges through the execution of SUID binaries, which would allow to create binaries owned by the service transient group with the setgid bit set. A local attacker may use this flaw to access resources that will be owned by a potentially different service in the future, when the GID will be recycled.

CVSS Score

7.8

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
Systemd ProjectSystemd< 242
CanonicalUbuntu Linux16.04
NetappHci Management Node-
NetappSnapprotect-
NetappSolidfire-
NetappCn1610 Firmware-
NetappCn1610-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2019-3844?

CVE-2019-3844 is a vulnerability with a CVSS score of 7.8 (HIGH). It was discovered that a systemd service that uses DynamicUser property can get new privileges through the execution of SUID binaries, which would allow to create binaries owned by the service transie...

How severe is CVE-2019-3844?

CVE-2019-3844 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2019-3844?

Check the references section above for vendor advisories and patch information. Affected products include: Systemd Project Systemd, Canonical Ubuntu Linux, Netapp Hci Management Node, Netapp Snapprotect, Netapp Solidfire.