CVE-2018-16866

An out of bounds read was discovered in systemd-journald in the way it parses log messages that terminate with a colon ':'. A local attacker can use this flaw to disclose process memory data. Versions from v221 to v239 are vulnerable.
Configurations

Configuration 1 (hide)

cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:netapp:active_iq_performance_analytics_services:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:element_software:*:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_compute_node_eus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_\(structure_a\):7_s390x:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

History

13 Feb 2023, 04:52

Type Values Removed Values Added
Summary An out of bounds read was discovered in systemd-journald in the way it parses log messages that terminate with a colon ':'. A local attacker can use this flaw to disclose process memory data. An out of bounds read was discovered in systemd-journald in the way it parses log messages that terminate with a colon ':'. A local attacker can use this flaw to disclose process memory data. Versions from v221 to v239 are vulnerable.
CWE CWE-200
References
  • {'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1653867', 'name': 'https://bugzilla.redhat.com/show_bug.cgi?id=1653867', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2020:1264', 'name': 'https://access.redhat.com/errata/RHSA-2020:1264', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/security/cve/CVE-2018-16866', 'name': 'https://access.redhat.com/security/cve/CVE-2018-16866', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/errata/RHBA-2020:0547', 'name': 'https://access.redhat.com/errata/RHBA-2020:0547', 'tags': [], 'refsource': 'MISC'}

02 Feb 2023, 16:18

Type Values Removed Values Added
References
  • (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=1653867 -
  • (MISC) https://access.redhat.com/errata/RHSA-2020:1264 -
  • (MISC) https://access.redhat.com/security/cve/CVE-2018-16866 -
  • (MISC) https://access.redhat.com/errata/RHBA-2020:0547 -
Summary An out of bounds read was discovered in systemd-journald in the way it parses log messages that terminate with a colon ':'. A local attacker can use this flaw to disclose process memory data. Versions from v221 to v239 are vulnerable. An out of bounds read was discovered in systemd-journald in the way it parses log messages that terminate with a colon ':'. A local attacker can use this flaw to disclose process memory data.

20 Feb 2022, 06:07

Type Values Removed Values Added
CPE cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_\(structure_a\):7_s390x:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_compute_node_eus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.6:*:*:*:*:*:*:*
References (BUGTRAQ) https://seclists.org/bugtraq/2019/May/25 - (BUGTRAQ) https://seclists.org/bugtraq/2019/May/25 - Mailing List, Third Party Advisory
References (MLIST) http://www.openwall.com/lists/oss-security/2019/05/10/4 - (MLIST) http://www.openwall.com/lists/oss-security/2019/05/10/4 - Mailing List, Third Party Advisory
References (FULLDISC) http://seclists.org/fulldisclosure/2019/May/21 - (FULLDISC) http://seclists.org/fulldisclosure/2019/May/21 - Mailing List, Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2020:0593 - (REDHAT) https://access.redhat.com/errata/RHSA-2020:0593 - Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2019:3222 - (REDHAT) https://access.redhat.com/errata/RHSA-2019:3222 - Third Party Advisory
References (MISC) http://packetstormsecurity.com/files/152841/System-Down-A-systemd-journald-Exploit.html - (MISC) http://packetstormsecurity.com/files/152841/System-Down-A-systemd-journald-Exploit.html - Third Party Advisory, VDB Entry
References (REDHAT) https://access.redhat.com/errata/RHSA-2019:2091 - (REDHAT) https://access.redhat.com/errata/RHSA-2019:2091 - Third Party Advisory
First Time Redhat enterprise Linux For Power Big Endian
Redhat enterprise Linux Compute Node Eus
Redhat enterprise Linux For Power Little Endian
Redhat enterprise Linux Server Update Services For Sap Solutions
Redhat enterprise Linux For Power Big Endian Eus
Redhat enterprise Linux Desktop
Redhat enterprise Linux Server
Redhat enterprise Linux Server Tus
Redhat enterprise Linux For Ibm Z Systems \(structure A\)
Redhat enterprise Linux Workstation
Redhat enterprise Linux Server Aus
Redhat enterprise Linux
Redhat enterprise Linux For Power Little Endian Eus
Redhat enterprise Linux For Ibm Z Systems Eus
Redhat enterprise Linux Server For Power Little Endian Update Services For Sap Solutions
Redhat
Redhat enterprise Linux For Scientific Computing

28 Jan 2022, 19:12

Type Values Removed Values Added
First Time Systemd Project
Systemd Project systemd
CPE cpe:2.3:a:freedesktop:systemd:*:*:*:*:*:*:*:* cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*

Information

Published : 2019-01-11 19:29

Updated : 2023-12-10 12:44


NVD link : CVE-2018-16866

Mitre link : CVE-2018-16866

CVE.ORG link : CVE-2018-16866


JSON object : View

Products Affected

redhat

  • enterprise_linux_for_ibm_z_systems_\(structure_a\)
  • enterprise_linux_server_aus
  • enterprise_linux_server_tus
  • enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions
  • enterprise_linux_for_power_little_endian_eus
  • enterprise_linux_for_scientific_computing
  • enterprise_linux_for_power_big_endian_eus
  • enterprise_linux_for_ibm_z_systems_eus
  • enterprise_linux_workstation
  • enterprise_linux_server
  • enterprise_linux_compute_node_eus
  • enterprise_linux_for_power_little_endian
  • enterprise_linux_for_power_big_endian
  • enterprise_linux_desktop
  • enterprise_linux
  • enterprise_linux_server_update_services_for_sap_solutions

debian

  • debian_linux

netapp

  • element_software
  • active_iq_performance_analytics_services

systemd_project

  • systemd

canonical

  • ubuntu_linux
CWE
CWE-125

Out-of-bounds Read

CWE-200

Exposure of Sensitive Information to an Unauthorized Actor