vulnerability

Oracle Linux: CVE-2019-15718: ELSA-2019-3592: systemd security, bug fix, and enhancement update (MODERATE) (Multiple Advisories)

Severity
4
CVSS
(AV:L/AC:L/Au:S/C:P/I:P/A:P)
Published
Sep 3, 2019
Added
Oct 5, 2022
Modified
Nov 30, 2024

Description

In systemd 240, bus_open_system_watch_bind_with_description in shared/bus-util.c (as used by systemd-resolved to connect to the system D-Bus instance), calls sd_bus_set_trusted, which disables access controls for incoming D-Bus messages. An unprivileged user can exploit this by executing D-Bus methods that should be restricted to privileged users, in order to change the system's DNS resolver settings.
An improper authorization flaw was discovered in systemd-resolved in the way it configures the exposed DBus interface org.freedesktop.resolve1. An unprivileged local attacker could call all DBus methods, even when marked as privileged operations. An attacker could abuse this flaw by changing the DNS, Search Domain, LLMNR, DNSSEC and other network link settings without any authorization, allowing control of the network names resolution process and cause the system to communicate with wrong or malicious servers.

Solution(s)

oracle-linux-upgrade-systemdoracle-linux-upgrade-systemd-containeroracle-linux-upgrade-systemd-develoracle-linux-upgrade-systemd-journal-remoteoracle-linux-upgrade-systemd-libsoracle-linux-upgrade-systemd-pamoracle-linux-upgrade-systemd-testsoracle-linux-upgrade-systemd-udev
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.