Rapid7 Vulnerability & Exploit Database

CentOS Linux: CVE-2018-15688: Important: NetworkManager security update (Multiple Advisories)

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

CentOS Linux: CVE-2018-15688: Important: NetworkManager security update (Multiple Advisories)

Severity
6
CVSS
(AV:A/AC:L/Au:N/C:P/I:P/A:P)
Published
10/26/2018
Created
03/19/2019
Added
12/15/2018
Modified
05/25/2023

Description

A buffer overflow vulnerability in the dhcp6 client of systemd allows a malicious dhcp6 server to overwrite heap memory in systemd-networkd. Affected releases are systemd: versions up to and including 239.

Solution(s)

  • centos-upgrade-libgudev1
  • centos-upgrade-libgudev1-devel
  • centos-upgrade-networkmanager
  • centos-upgrade-networkmanager-adsl
  • centos-upgrade-networkmanager-bluetooth
  • centos-upgrade-networkmanager-config-server
  • centos-upgrade-networkmanager-debuginfo
  • centos-upgrade-networkmanager-dispatcher-routing-rules
  • centos-upgrade-networkmanager-glib
  • centos-upgrade-networkmanager-glib-devel
  • centos-upgrade-networkmanager-libnm
  • centos-upgrade-networkmanager-libnm-devel
  • centos-upgrade-networkmanager-ovs
  • centos-upgrade-networkmanager-ppp
  • centos-upgrade-networkmanager-team
  • centos-upgrade-networkmanager-tui
  • centos-upgrade-networkmanager-wifi
  • centos-upgrade-networkmanager-wwan
  • centos-upgrade-systemd
  • centos-upgrade-systemd-debuginfo
  • centos-upgrade-systemd-devel
  • centos-upgrade-systemd-journal-gateway
  • centos-upgrade-systemd-libs
  • centos-upgrade-systemd-networkd
  • centos-upgrade-systemd-python
  • centos-upgrade-systemd-resolved
  • centos-upgrade-systemd-sysv

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;