First published: Tue Aug 27 2019(Updated: )
An improper authorization flaw was discovered in systemd-resolved in the way it configures the exposed DBus interface org.freedesktop.resolve1. An unprivileged local attacker could call all DBus methods, even when marked as privileged operations. An attacker could abuse this flaw by changing the DNS, Search Domain, LLMNR, DNSSEC and other network link settings without any authorization, allowing control of the network names resolution process and cause the system to communicate with wrong or malicious servers.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/systemd | <0:239-18.el8 | 0:239-18.el8 |
redhat/systemd | <243 | 243 |
systemd | =240 | |
Red Hat Fedora | =29 | |
Red Hat Fedora | =30 | |
Red Hat Fedora | =31 | |
Red Hat OpenShift Container Platform | =4.1 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux Server EUS | =8.1 | |
Red Hat Enterprise Linux Server EUS | =8.2 | |
Red Hat Enterprise Linux Server EUS | =8.4 | |
Red Hat Enterprise Linux for IBM z Systems | ||
Red Hat Enterprise Linux for IBM Z Systems (s390x) | =8.1 | |
Red Hat Enterprise Linux for IBM Z Systems (s390x) | =8.2 | |
Red Hat Enterprise Linux for IBM Z Systems (s390x) | =8.4 | |
Red Hat Enterprise Linux for IBM Z Systems (s390x) | =8.1 | |
Red Hat Enterprise Linux for IBM Z Systems (s390x) | =8.2 | |
Red Hat Enterprise Linux for Power, little endian | =8.0 | |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | =8.1 | |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | =8.2 | |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | =8.4 | |
Red Hat Enterprise Linux Server | =8.2 | |
Red Hat Enterprise Linux Server | =8.4 | |
Red Hat Enterprise Linux for SAP Applications for Power, little endian - Extended Update Support | =8.1 | |
Red Hat Enterprise Linux for SAP Applications for Power, little endian - Extended Update Support | =8.2 | |
Red Hat Enterprise Linux for SAP Applications for Power, little endian - Extended Update Support | =8.4 | |
Red Hat Enterprise Linux Server | =8.2 | |
Red Hat Enterprise Linux Server | =8.4 | |
Red Hat Enterprise Linux Server Update Services for SAP Solutions | =8.1 | |
Red Hat Enterprise Linux Server Update Services for SAP Solutions | =8.2 | |
Red Hat Enterprise Linux Server Update Services for SAP Solutions | =8.4 |
Disable systemd-resolved service by using `sudo systemctl disable systemd-resolved`.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2019-15718.
The severity of CVE-2019-15718 is medium with a CVSS score of 5.3.
The affected software includes systemd versions 240, 243, and earlier, as well as Red Hat Enterprise Linux 8.0, 8.1, 8.2, 8.4, and other related distributions.
An attacker can exploit CVE-2019-15718 by calling all DBus methods, even privileged operations, through the exposed DBus interface org.freedesktop.resolve1.
More information about CVE-2019-15718 can be found at the following references: [GitHub Pull Request](https://github.com/systemd/systemd/pull/13457), [Bugzilla](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1748767).