CVE-2018-16888
low-risk
Published 2019-01-14
It was discovered systemd does not correctly check the content of PIDFile files before using it to kill processes. When a service is run from an unprivileged user (e.g. User field set in the service file), a local attacker who is able to write to the PIDFile of the mentioned service may use this flaw to trick systemd into killing other services and/or privileged processes. Versions before v237 are vulnerable.
Do I need to act?
-
0.16% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
4
CVSS 4.7/10
Medium
LOCAL
/ HIGH complexity
Affected Products (7)
Active Iq Performance Analytics Services
Affected Vendors
References (10)
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2091
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16888
Third Party Advisory
https://security.netapp.com/advisory/ntap-20190307-0007/
Third Party Advisory
https://usn.ubuntu.com/4269-1/
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2091
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16888
Third Party Advisory
https://security.netapp.com/advisory/ntap-20190307-0007/
Third Party Advisory
https://usn.ubuntu.com/4269-1/
27
/ 100
low-risk
Severity
12/34 · Low
Exploitability
1/34 · Minimal
Exposure
14/34 · Moderate