HomeSystemd ProjectCVE-2019-3843

CVE-2019-3843

HIGH
7.8CVSS
Published: 2019-04-26
Updated: 2024-11-21
AI Analysis

Description

It was discovered that a systemd service that uses DynamicUser property can create a SUID/SGID binary that would be allowed to run as the transient service UID/GID even after the service is terminated. A local attacker may use this flaw to access resources that will be owned by a potentially different service in the future, when the UID/GID will be recycled.

CVSS Metrics

Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
local
Complexity
low
Privileges
low
User Action
none
Scope
unchanged
Confidentiality
high
Integrity
high
Availability
high
Weaknesses
CWE-266CWE-269

Metadata

Primary Vendor
SYSTEMD_PROJECT
Published
4/26/2019
Last Modified
11/21/2024
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

systemd_project : systemdfedoraproject : fedoracanonical : ubuntu_linuxcanonical : ubuntu_linuxcanonical : ubuntu_linuxnetapp : hci_management_nodenetapp : snapprotectnetapp : solidfirenetapp : cn1610_firmware

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2019-3843 | HIGH Severity | CVEDatabase.com | CVEDatabase.com