CVE-2018-16865
Published at:
-
11-01-2019 10:29
Last modified:
-
31-01-2022 07:34
Total changes:
-
3
Description
Common Vulnerability Scoring System (CVSS)
Low
Attack complexity
Local
Attack vector
High
Availability
High
Confidentiality
High
Integrity
Low
Privileges required
Unchanged
Scope
None
User interaction
7.8
Base score
1.8
5.9
Exploitability score
Impact score
Verification logic
Reference
- https://www.qualys.com/2019/01/09/system-down/system-down.txt
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16865
- USN-3855-1-Third Party Advisory
- 106525-Third Party Advisory, VDB Entry
- DSA-4367-Third Party Advisory
- RHSA-2019:0049-Third Party Advisory
- https://security.netapp.com/advisory/ntap-20190117-0001/
- [debian-lts-announce] 20190123 [SECURITY] [DLA 1639-1] systemd security update-Mailing List, Third Party Advisory
- RHSA-2019:0204-Third Party Advisory
- RHSA-2019:0271-Third Party Advisory
- RHSA-2019:0342-Third Party Advisory
- RHSA-2019:0361-Third Party Advisory
- GLSA-201903-07-Third Party Advisory
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- RHBA-2019:0327-Third Party Advisory
- [oss-security] 20190510 Re: System Down: A systemd-journald exploit-Mailing List, Third Party Advisory
- 20190513 Re: System Down: A systemd-journald exploit-Mailing List, Third Party Advisory
- http://packetstormsecurity.com/files/152841/System-Down-A-systemd-journald-Exploit.html
- 20190513 Re: System Down: A systemd-journald exploit-Mailing List, Third Party Advisory
- RHSA-2019:2402-Third Party Advisory
- [oss-security] 20210720 CVE-2021-33910: Denial of service (stack exhaustion) in systemd (PID 1)-Mailing List, Third Party Advisory
Keywords