CVE-2019-15718 - log back

CVE-2019-15718 edited at 02 Oct 2019 12:34:47
Description
- systemd-resolved before v234 does not properly enforce any access control to its dbus methods, allowing any unprivileged user to access its API. An attacker may use this flaw to configure the DNS, the Default Route or other properties of a network link. Those operations should be performed only by an high-privileged user.
+ An improper authorization flaw was discovered in systemd-resolved before v234 in the way it configures the exposed DBus interface org.freedesktop.resolve1. An unprivileged local attacker could call all DBus methods, even when marked as privileged operations. An attacker could abuse this flaw by changing the DNS, Search Domain, LLMNR, DNSSEC and other network link settings without any authorization, allowing control of the network names resolution process and cause the system to communicate with wrong or malicious servers. Those operations should be performed only by an high-privileged user.
CVE-2019-15718 edited at 02 Oct 2019 12:28:09
References
https://bugzilla.redhat.com/show_bug.cgi?id=1746057
- https://github.com/systemd/systemd/pull/13457/commits/35e528018f315798d3bffcb592b32a0d8f5162bd
+ https://github.com/systemd/systemd/commit/d93d10c3d101a73fe70d24154fd744a48371f002
+ https://github.com/systemd/systemd/pull/13457
https://www.openwall.com/lists/oss-security/2019/09/03/1
CVE-2019-15718 edited at 02 Oct 2019 12:26:26
References
https://bugzilla.redhat.com/show_bug.cgi?id=1746057
https://github.com/systemd/systemd/pull/13457/commits/35e528018f315798d3bffcb592b32a0d8f5162bd
+ https://www.openwall.com/lists/oss-security/2019/09/03/1
CVE-2019-15718 created at 25 Sep 2019 19:31:40
Severity
+ Medium
Remote
+ Local
Type
+ Access restriction bypass
Description
+ systemd-resolved before v234 does not properly enforce any access control to its dbus methods, allowing any unprivileged user to access its API. An attacker may use this flaw to configure the DNS, the Default Route or other properties of a network link. Those operations should be performed only by an high-privileged user.
References
+ https://bugzilla.redhat.com/show_bug.cgi?id=1746057
+ https://github.com/systemd/systemd/pull/13457/commits/35e528018f315798d3bffcb592b32a0d8f5162bd
Notes