Unknown
CVE-2019-6454
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2019-6454
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
An issue was discovered in sd-bus in systemd 239. bus_process_object() in libsystemd/sd-bus/bus-objects.c allocates a variable-length stack buffer for temporarily storing the object path of incoming D-Bus messages. An unprivileged local user can exploit this by sending a specially crafted message to PID1, causing the stack pointer to jump over the stack guard pages into an unmapped memory region and trigger a denial of service (systemd PID1 crash and kernel panic).
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
- canonical,
- debian,
- fedoraproject,
- mcafee,
- netapp,
- opensuse,
- redhat,
- systemd project
Products
- active iq performance analytics services -,
- debian linux 8.0,
- debian linux 9.0,
- enterprise linux 8.0,
- enterprise linux compute node eus 7.5,
- enterprise linux desktop 7.0,
- enterprise linux eus 7.4,
- enterprise linux eus 7.5,
- enterprise linux eus 8.1,
- enterprise linux eus 8.2,
- enterprise linux eus 8.4,
- enterprise linux for ibm z systems eus 7.4,
- enterprise linux for ibm z systems eus 7.5,
- enterprise linux for ibm z systems eus 8.1,
- enterprise linux for ibm z systems eus 8.2,
- enterprise linux for ibm z systems eus 8.4,
- enterprise linux for power big endian eus 7.4,
- enterprise linux for power little endian 8.0,
- enterprise linux for power little endian eus 7.4,
- enterprise linux for power little endian eus 7.5,
- enterprise linux for power little endian eus 8.1,
- enterprise linux for power little endian eus 8.2,
- enterprise linux for power little endian eus 8.4,
- enterprise linux server 7.0,
- enterprise linux server aus 7.3,
- enterprise linux server aus 7.4,
- enterprise linux server aus 7.6,
- enterprise linux server aus 8.2,
- enterprise linux server aus 8.4,
- enterprise linux server eus 7.6,
- enterprise linux server for power little endian update services for sap solutions 7.3,
- enterprise linux server for power little endian update services for sap solutions 7.4,
- enterprise linux server for power little endian update services for sap solutions 8.0,
- enterprise linux server for power little endian update services for sap solutions 8.1,
- enterprise linux server for power little endian update services for sap solutions 8.2,
- enterprise linux server tus 7.3,
- enterprise linux server tus 7.4,
- enterprise linux server tus 7.6,
- enterprise linux server tus 8.2,
- enterprise linux server tus 8.4,
- enterprise linux server update services for sap solutions 7.3,
- enterprise linux server update services for sap solutions 7.4,
- enterprise linux server update services for sap solutions 8.0,
- enterprise linux server update services for sap solutions 8.1,
- enterprise linux server update services for sap solutions 8.2,
- enterprise linux workstation 7.0,
- fedora 29,
- leap 15.0,
- systemd 239,
- ubuntu linux 16.04,
- ubuntu linux 18.04,
- ubuntu linux 18.10,
- web gateway
References
Advisory
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: