8.8 High
CVSS3
Attack Vector
ADJACENT_NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
5.8 Medium
CVSS2
Access Vector
ADJACENT_NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:A/AC:L/Au:N/C:P/I:P/A:P
libsystemd.so is vulnerable to denial of service. A malicious DHCP server in the adjacent network is able to corrupt heap memory in the DHCPv6 client via a crafted options
packet, resulting in a denial of service condition or possible code execution.
CPE | Name | Operator | Version |
---|---|---|---|
libsystemd.so | le | 0.35.0 | |
libsystemd.so | le | 0.35.0 |
www.securityfocus.com/bid/105745
access.redhat.com/errata/RHBA-2019:0327
access.redhat.com/errata/RHSA-2018:3665
access.redhat.com/errata/RHSA-2019:0049
bugzilla.redhat.com/show_bug.cgi?id=1639067
github.com/systemd/systemd/commit/4dac5eaba4e419b29c97da38a8b1f82336c2c892
github.com/systemd/systemd/pull/10518
lists.debian.org/debian-lts-announce/2018/11/msg00017.html
security.gentoo.org/glsa/201810-10
usn.ubuntu.com/3806-1/
usn.ubuntu.com/3807-1/
8.8 High
CVSS3
Attack Vector
ADJACENT_NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
5.8 Medium
CVSS2
Access Vector
ADJACENT_NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:A/AC:L/Au:N/C:P/I:P/A:P