CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:N/I:N/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
20.2%
The manager_dispatch_notify_fd function in systemd allows local users to cause a denial of service (system hang) via a zero-length message received over a notify socket, which causes an error to be returned and the notification handler to be disabled.
Vendor | Product | Version | CPE |
---|---|---|---|
systemd_project | systemd | 209 | cpe:2.3:a:systemd_project:systemd:209:*:*:*:*:*:*:* |
systemd_project | systemd | 213 | cpe:2.3:a:systemd_project:systemd:213:*:*:*:*:*:*:* |
systemd_project | systemd | 214 | cpe:2.3:a:systemd_project:systemd:214:*:*:*:*:*:*:* |
systemd_project | systemd | 229 | cpe:2.3:a:systemd_project:systemd:229:*:*:*:*:*:*:* |
novell | suse_linux_enterprise_software_development_kit | 12.0 | cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:* |
novell | suse_linux_enterprise_desktop | 12 | cpe:2.3:o:novell:suse_linux_enterprise_desktop:12:sp1:*:*:*:*:*:* |
novell | suse_linux_enterprise_server | 12.0 | cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:ltss:*:*:* |
novell | suse_linux_enterprise_server | 12.0 | cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:* |
novell | suse_linux_enterprise_server_for_sap | 12.0 | cpe:2.3:o:novell:suse_linux_enterprise_server_for_sap:12.0:*:*:*:*:*:*:* |
redhat | enterprise_linux_desktop | 7.0 | cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:* |
lists.opensuse.org/opensuse-security-announce/2016-10/msg00015.html
lists.opensuse.org/opensuse-security-announce/2016-10/msg00016.html
rhn.redhat.com/errata/RHSA-2017-0003.html
www.openwall.com/lists/oss-security/2016/09/30/1
www.securityfocus.com/bid/93250
www.securitytracker.com/id/1037320
bugzilla.redhat.com/show_bug.cgi?id=1381911
github.com/systemd/systemd/issues/4234#issuecomment-250441246
rhn.redhat.com/errata/RHBA-2015-2092.html
www.agwa.name/blog/post/how_to_crash_systemd_in_one_tweet
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:N/I:N/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
20.2%