Improper PID File Validation in systemd Affects Local Processes
CVE-2018-16888

4.4MEDIUM

Key Information:

Status
Vendor
CVE Published:
14 January 2019

What is CVE-2018-16888?

A vulnerability in systemd allows local attackers to exploit insufficient validation of PIDFile contents, potentially leading to the termination of unintended services and privileged processes. If a service operates under an unprivileged user, the attacker can write to the PIDFile, persuading systemd to kill processes it should not have access to. As a result, this can cause disruption in service and system stability, particularly for versions prior to v237.

Affected Version(s)

systemd v237

References

CVSS V3.1

Score:
4.4
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Local
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
Required
Scope:
Unchanged

CVSS V3.0

Score:
4.4
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Local
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.