[CentOS] From slashdot, systemd memory corruption bugs

Fri Jan 11 17:18:23 UTC 2019
mark <m.roth at 5-cent.us>

Story:
 Linux systemd Affected by Memory Corruption Vulnerabilities, No Patches
Yet (bleepingcomputer.com) 286
Posted by msmash on Thursday January 10, 2019 @01:00PM from the
call-the-IT dept.
Major Linux distributions are vulnerable to three bugs in systemd, a Linux
initialization system and service manager in widespread use,
California-based security company Qualys said late yesterday. From a
report:
The bugs exist in 'journald' service, tasked with collecting and storing
log data, and they can be exploited to obtain root privileges on the
target machine or to leak information. No patches exist at the moment.
Discovered by researchers at Qualys, the flaws are two memory corruption
vulnerabilities (stack buffer overflow - CVE-2018-16864, and allocation of
memory without limits - CVE-2018-16865) and one out-of-bounds error
(CVE-2018-16866). They were able to obtain local root shell on both x86
and x64 machines by exploiting CVE-2018-16865 and CVE-2018-16866. The
exploit worked faster on the x86 platform, achieving its purpose in ten
minutes; on x64, though, the exploit took 70 minutes to complete. Qualys
is planning on publishing the proof-of-concept exploit code in the near
future, but they did provide details on how they were able to take
advantage of the flaws.
                      -- 30 --

    mark "Paging Mr. Poettering...."