HomeSystemd ProjectCVE-2019-6454

CVE-2019-6454

MEDIUM
5.5CVSS
Published: 2019-03-21
Updated: 2024-11-21
AI Analysis

Description

An issue was discovered in sd-bus in systemd 239. bus_process_object() in libsystemd/sd-bus/bus-objects.c allocates a variable-length stack buffer for temporarily storing the object path of incoming D-Bus messages. An unprivileged local user can exploit this by sending a specially crafted message to PID1, causing the stack pointer to jump over the stack guard pages into an unmapped memory region and trigger a denial of service (systemd PID1 crash and kernel panic).

CVSS Metrics

Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Attack Vector
local
Complexity
low
Privileges
low
User Action
none
Scope
unchanged
Confidentiality
none
Integrity
none
Availability
high
Weaknesses
CWE-787

Metadata

Primary Vendor
SYSTEMD_PROJECT
Published
3/21/2019
Last Modified
11/21/2024
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

systemd_project : systemdopensuse : leapnetapp : active_iq_performance_analytics_servicesdebian : debian_linuxdebian : debian_linuxfedoraproject : fedoracanonical : ubuntu_linuxcanonical : ubuntu_linuxcanonical : ubuntu_linuxredhat : enterprise_linuxredhat : enterprise_linux_compute_node_eusredhat : enterprise_linux_desktopredhat : enterprise_linux_eusredhat : enterprise_linux_eusredhat : enterprise_linux_eusredhat : enterprise_linux_eusredhat : enterprise_linux_eusredhat : enterprise_linux_for_ibm_z_systems_eusredhat : enterprise_linux_for_ibm_z_systems_eusredhat : enterprise_linux_for_ibm_z_systems_eusredhat : enterprise_linux_for_ibm_z_systems_eusredhat : enterprise_linux_for_ibm_z_systems_eusredhat : enterprise_linux_for_power_big_endian_eusredhat : enterprise_linux_for_power_little_endianredhat : enterprise_linux_for_power_little_endian_eusredhat : enterprise_linux_for_power_little_endian_eusredhat : enterprise_linux_for_power_little_endian_eusredhat : enterprise_linux_for_power_little_endian_eusredhat : enterprise_linux_for_power_little_endian_eusredhat : enterprise_linux_serverredhat : enterprise_linux_server_ausredhat : enterprise_linux_server_ausredhat : enterprise_linux_server_ausredhat : enterprise_linux_server_ausredhat : enterprise_linux_server_ausredhat : enterprise_linux_server_eusredhat : enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutionsredhat : enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutionsredhat : enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutionsredhat : enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutionsredhat : enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutionsredhat : enterprise_linux_server_tusredhat : enterprise_linux_server_tusredhat : enterprise_linux_server_tusredhat : enterprise_linux_server_tusredhat : enterprise_linux_server_tusredhat : enterprise_linux_server_update_services_for_sap_solutionsredhat : enterprise_linux_server_update_services_for_sap_solutionsredhat : enterprise_linux_server_update_services_for_sap_solutionsredhat : enterprise_linux_server_update_services_for_sap_solutionsredhat : enterprise_linux_server_update_services_for_sap_solutionsredhat : enterprise_linux_workstationmcafee : web_gatewaymcafee : web_gatewaymcafee : web_gateway

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2019-6454 | MEDIUM Severity | CVEDatabase.com | CVEDatabase.com