Lucene search

K
archlinuxArchLinuxASA-201610-2
HistoryOct 04, 2016 - 12:00 a.m.

[ASA-201610-2] systemd: denial of service

2016-10-0400:00:00
security.archlinux.org
12

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

4.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:N/I:N/A:C

0.0004 Low

EPSS

Percentile

5.3%

Arch Linux Security Advisory ASA-201610-2

Severity: High
Date : 2016-10-04
CVE-ID : CVE-2016-7795
Package : systemd
Type : denial of service
Remote : No
Link : https://wiki.archlinux.org/index.php/CVE

Summary

The package systemd before version 231-2 is vulnerable to denial of
service.

Resolution

Upgrade to 231-2.

pacman -Syu “systemd>=231-2”

The problem has been fixed upstream but no release is available yet.

Workaround

None.

Description

systemd fails an assertion in manager_invoke_notify_message when a
zero-length message is received over its notification socket. After
failing the assertion, PID 1 hangs in the pause system call. It is no
longer possible to start and stop daemons or cleanly reboot the system.
Inetd-style services managed by systemd no longer accept connections.
Since the notification socket, /run/systemd/notify, is world-writable,
this allows a local user to perform a denial-of-service attack against
systemd.
Proof-of-concept:
NOTIFY_SOCKET=/run/systemd/notify systemd-notify “”

Impact

A local attacker is able to perform a denial of service attack by
obstructing start/stop of any daemons and clean reboot of the system.

References

https://github.com/systemd/systemd/issues/4234
http://www.openwall.com/lists/oss-security/2016/09/28/9
https://access.redhat.com/security/cve/CVE-2016-7795

OSVersionArchitecturePackageVersionFilename
ArchLinuxanyanysystemd< 231-2UNKNOWN

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

4.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:N/I:N/A:C

0.0004 Low

EPSS

Percentile

5.3%