Executive Summary

Informations
NameCVE-2018-16864First vendor Publication2019-01-11
VendorCveLast vendor Modification2019-04-26

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score4.6Attack RangeLocal
Cvss Impact Score6.4Attack ComplexityLow
Cvss Expoit Score3.9AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

An allocation of memory without limits, that could result in the stack clashing with another memory region, was discovered in systemd-journald when a program with long command line arguments calls syslog. A local attacker may use this flaw to crash systemd-journald or escalate his privileges. Versions through v240 are vulnerable.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16864

CWE : Common Weakness Enumeration

%idName
100 %CWE-119Failure to Constrain Operations within the Bounds of a Memory Buffer

CPE : Common Platform Enumeration

TypeDescriptionCount
Application111
Application3
Application2
Os3
Os2
Os1
Os4
Os1
Os2
Os1
Os1
Os1

Snort® IPS/IDS

DateDescription
2019-04-30Unix systemd-journald memory corruption attempt
RuleID : 49618 - Revision : 1 - Type : FILE-OTHER
2019-04-30Unix systemd-journald memory corruption attempt
RuleID : 49617 - Revision : 1 - Type : FILE-OTHER

Nessus® Vulnerability Scanner

DateDescription
2019-01-16Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2019-0049.nasl - Type : ACT_GATHER_INFO
2019-01-14Name : The remote Debian host is missing a security-related update.
File : debian_DSA-4367.nasl - Type : ACT_GATHER_INFO
2019-01-14Name : The remote Fedora host is missing a security update.
File : fedora_2019-18b3a10c7f.nasl - Type : ACT_GATHER_INFO
2019-01-10Name : The remote Amazon Linux 2 host is missing a security update.
File : al2_ALAS-2019-1141.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

SourceUrl
BID http://www.securityfocus.com/bid/106523
CONFIRM https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16864
https://security.netapp.com/advisory/ntap-20190117-0001/
DEBIAN https://www.debian.org/security/2019/dsa-4367
GENTOO https://security.gentoo.org/glsa/201903-07
MISC https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.qualys.com/2019/01/09/system-down/system-down.txt
MLIST https://lists.debian.org/debian-lts-announce/2019/01/msg00016.html
REDHAT https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2019:0049
https://access.redhat.com/errata/RHSA-2019:0204
https://access.redhat.com/errata/RHSA-2019:0271
https://access.redhat.com/errata/RHSA-2019:0342
https://access.redhat.com/errata/RHSA-2019:0361
UBUNTU https://usn.ubuntu.com/3855-1/

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
DateInformations
2019-05-03 00:19:00
  • Multiple Updates
2019-04-29 21:19:24
  • Multiple Updates
2019-04-26 21:19:39
  • Multiple Updates
2019-04-24 13:19:11
  • Multiple Updates
2019-04-24 05:18:57
  • Multiple Updates
2019-04-24 00:18:55
  • Multiple Updates
2019-03-12 17:19:28
  • Multiple Updates
2019-03-11 13:18:57
  • Multiple Updates
2019-03-05 00:19:10
  • Multiple Updates
2019-02-23 09:19:19
  • Multiple Updates
2019-02-05 17:19:25
  • Multiple Updates
2019-01-30 21:18:43
  • Multiple Updates
2019-01-23 17:19:22
  • Multiple Updates
2019-01-18 17:19:10
  • Multiple Updates
2019-01-15 17:19:30
  • Multiple Updates
2019-01-14 17:19:27
  • Multiple Updates
2019-01-12 17:18:59
  • Multiple Updates
2019-01-12 00:18:58
  • First insertion