First published: Thu Sep 20 2012(Updated: )
An integer overflow, leading to heap-based buffer overflow flaw was found in the way journald functionality of systemd, a system and service manager, processed native messages. A local attacker could provide a specially-crafted packet that when processed by systemd would lead to systemd daemon crash or, potentially, arbitrary code execution with the privileges of the user running the daemon. Issue found by Florian Weimer, Red Hat Product Security Team Upstream patch: [1] <a href="http://cgit.freedesktop.org/systemd/systemd/commit/?id=505b6a61c22d5565e9308045c7b9bf79f7d0517e">http://cgit.freedesktop.org/systemd/systemd/commit/?id=505b6a61c22d5565e9308045c7b9bf79f7d0517e</a>
Affected Software | Affected Version | How to fix |
---|---|---|
systemd |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-859051 is considered high due to the potential for local attackers to crash the systemd daemon.
To fix REDHAT-BUG-859051, ensure that your systemd package is updated to the latest version that addresses this vulnerability.
REDHAT-BUG-859051 affects users of Red Hat's systemd, specifically those versions that are vulnerable to integer overflow and heap-based buffer overflow.
No, REDHAT-BUG-859051 requires local access for exploitation, making it less dangerous compared to remote vulnerabilities.
The potential consequences of REDHAT-BUG-859051 include system instability and the potential for a denial of service due to systemd daemon crashes.