First published: Tue Aug 27 2019(Updated: )
An improper authorization flaw was discovered in systemd-resolved in the way it configures the exposed DBus interface org.freedesktop.resolve1. An unprivileged local attacker could call all DBus methods, even when marked as privileged operations. An attacker could abuse this flaw by changing the DNS, Search Domain, LLMNR, DNSSEC and other network link settings without any authorization, allowing control of the network names resolution process and cause the system to communicate with wrong or malicious servers.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/systemd | <0:239-18.el8 | 0:239-18.el8 |
Systemd Project Systemd | =240 | |
Fedoraproject Fedora | =29 | |
Fedoraproject Fedora | =30 | |
Fedoraproject Fedora | =31 | |
Redhat Openshift Container Platform | =4.1 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux Eus | =8.1 | |
Redhat Enterprise Linux Eus | =8.2 | |
Redhat Enterprise Linux Eus | =8.4 | |
Redhat Enterprise Linux For Ibm Z Systems 8 S390x | ||
Redhat Enterprise Linux For Ibm Z Systems Eus | =8.1 | |
Redhat Enterprise Linux For Ibm Z Systems Eus | =8.2 | |
Redhat Enterprise Linux For Ibm Z Systems Eus | =8.4 | |
Redhat Enterprise Linux For Ibm Z Systems Eus S390x | =8.1 | |
Redhat Enterprise Linux For Ibm Z Systems Eus S390x | =8.2 | |
Redhat Enterprise Linux For Power Little Endian | =8.0 | |
Redhat Enterprise Linux For Power Little Endian Eus | =8.1 | |
Redhat Enterprise Linux For Power Little Endian Eus | =8.2 | |
Redhat Enterprise Linux For Power Little Endian Eus | =8.4 | |
Redhat Enterprise Linux Server Aus | =8.2 | |
Redhat Enterprise Linux Server Aus | =8.4 | |
Redhat Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions | =8.1 | |
Redhat Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions | =8.2 | |
Redhat Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions | =8.4 | |
Redhat Enterprise Linux Server Tus | =8.2 | |
Redhat Enterprise Linux Server Tus | =8.4 | |
Redhat Enterprise Linux Server Update Services For Sap Solutions | =8.1 | |
Redhat Enterprise Linux Server Update Services For Sap Solutions | =8.2 | |
Redhat Enterprise Linux Server Update Services For Sap Solutions | =8.4 |
Disable systemd-resolved service by using `sudo systemctl disable systemd-resolved`.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2019-15718.
The severity of CVE-2019-15718 is medium with a CVSS score of 5.3.
The affected software includes systemd versions 240, 243, and earlier, as well as Red Hat Enterprise Linux 8.0, 8.1, 8.2, 8.4, and other related distributions.
An attacker can exploit CVE-2019-15718 by calling all DBus methods, even privileged operations, through the exposed DBus interface org.freedesktop.resolve1.
More information about CVE-2019-15718 can be found at the following references: [GitHub Pull Request](https://github.com/systemd/systemd/pull/13457), [Bugzilla](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1748767).