In systemd 240, bus_open_system_watch_bind_with_description in shared/bus-util.c (as used by systemd-resolved to connect to the system D-Bus instance), calls sd_bus_set_trusted, which disables access controls for incoming D-Bus messages. An unprivileged user can exploit this by executing D-Bus methods that should be restricted to privileged users, in order to change the system's DNS resolver settings.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
No history.
Information
Published : 2019-09-04 12:15
Updated : 2024-11-21 04:29
NVD link : CVE-2019-15718
Mitre link : CVE-2019-15718
CVE.ORG link : CVE-2019-15718
JSON object : View
Products Affected
systemd_project
- systemd
fedoraproject
- fedora
redhat
- enterprise_linux_server_aus
- enterprise_linux_for_power_little_endian
- enterprise_linux_for_ibm_z_systems_8_s390x
- enterprise_linux_eus
- enterprise_linux_server_update_services_for_sap_solutions
- enterprise_linux
- enterprise_linux_for_power_little_endian_eus
- enterprise_linux_for_ibm_z_systems_eus
- openshift_container_platform
- enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions
- enterprise_linux_for_ibm_z_systems_eus_s390x
- enterprise_linux_server_tus
CWE