Improper PID File Validation in systemd Affects Local Processes
CVE-2018-16888
4.4MEDIUM
What is CVE-2018-16888?
A vulnerability in systemd allows local attackers to exploit insufficient validation of PIDFile contents, potentially leading to the termination of unintended services and privileged processes. If a service operates under an unprivileged user, the attacker can write to the PIDFile, persuading systemd to kill processes it should not have access to. As a result, this can cause disruption in service and system stability, particularly for versions prior to v237.
Affected Version(s)
systemd v237
References
CVSS V3.1
Score:
4.4
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Local
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
Required
Scope:
Unchanged
CVSS V3.0
Score:
4.4
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Local
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
