7.8
CWE
268
Advisory Published
CVE Published
Updated

CVE-2019-3844

First published: Fri Mar 01 2019(Updated: )

It was discovered that a systemd service that uses DynamicUser property can get new privileges through the execution of SUID binaries, which would allow to create binaries owned by the service transient group with the setgid bit set. A local attacker may use this flaw to access resources that will be owned by a potentially different service in the future, when the GID will be recycled.

Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com

Affected SoftwareAffected VersionHow to fix
Systemd Project Systemd<242
Canonical Ubuntu Linux=16.04
Canonical Ubuntu Linux=18.04
Canonical Ubuntu Linux=19.10
Netapp Hci Management Node
Netapp Snapprotect
Netapp Solidfire
Netapp Cn1610 Firmware
Netapp Cn1610
redhat/systemd<242
242
All of
Netapp Cn1610 Firmware
Netapp Cn1610
debian/systemd
247.3-7+deb11u5
247.3-7+deb11u6
252.31-1~deb12u1
257-2

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the vulnerability ID of this issue?

    The vulnerability ID of this issue is CVE-2019-3844.

  • What is the severity of CVE-2019-3844?

    The severity of CVE-2019-3844 is high with a severity value of 7.8.

  • Which software and versions are affected by CVE-2019-3844?

    The following software and versions are affected by CVE-2019-3844: Systemd Project Systemd (up to version 242), Canonical Ubuntu Linux 16.04 LTS, Canonical Ubuntu Linux 18.04 LTS, Canonical Ubuntu Linux 19.10, Netapp HCI Management Node, Netapp Snapprotect, Netapp Solidfire, and Netapp Cn1610 Firmware.

  • How can a local attacker exploit CVE-2019-3844?

    A local attacker can exploit CVE-2019-3844 by using a systemd service with DynamicUser property to execute SUID binaries and create binaries owned by the service transient group with the setgid bit set, which can grant new privileges and access resources.

  • Are there any known remedies or fixes for CVE-2019-3844?

    Yes, there are known remedies or fixes for CVE-2019-3844. For example, the Ubuntu package `systemd` can be fixed by applying version 237-3ubuntu10.38.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203