Description
An out of bounds read was discovered in systemd-journald in the way it parses log messages that terminate with a colon ':'. A local attacker can use this flaw to disclose process memory data. Versions from v221 to v239 are vulnerable.
References (14)
Core 14
Core References
Third Party Advisory vendor-advisory
x_refsource_debian
https://www.debian.org/security/2019/dsa-4367
Third Party Advisory x_refsource_confirm
https://security.netapp.com/advisory/ntap-20190117-0001/
Exploit, Third Party Advisory x_refsource_misc
https://www.qualys.com/2019/01/09/system-down/system-down.txt
Issue Tracking, Patch, Third Party Advisory x_refsource_confirm
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16866
Third Party Advisory vendor-advisory
x_refsource_ubuntu
https://usn.ubuntu.com/3855-1/
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/106527
Third Party Advisory vendor-advisory
x_refsource_gentoo
https://security.gentoo.org/glsa/201903-07
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2019/05/10/4
Mailing List, Third Party Advisory mailing-list
x_refsource_bugtraq
https://seclists.org/bugtraq/2019/May/25
Third Party Advisory, VDB Entry x_refsource_misc
http://packetstormsecurity.com/files/152841/System-Down-A-systemd-journald-Exploit.html
Mailing List, Third Party Advisory mailing-list
x_refsource_fulldisc
http://seclists.org/fulldisclosure/2019/May/21
Third Party Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHSA-2019:2091
Third Party Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHSA-2019:3222
Third Party Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHSA-2020:0593
Scores
CVSS v3
3.3
EPSS
0.0006
EPSS Percentile
18.8%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-125
CWE-200
Status
published
Products (27)
canonical/ubuntu_linux
16.04
canonical/ubuntu_linux
18.04
canonical/ubuntu_linux
18.10
debian/debian_linux
9.0
netapp/active_iq_performance_analytics_services
netapp/element_software
redhat/enterprise_linux
7.6
redhat/enterprise_linux_compute_node_eus
7.6
redhat/enterprise_linux_desktop
7.0
redhat/enterprise_linux_for_ibm_z_systems_\(structure_a\)
7_s390x
... and 17 more
Published
Jan 11, 2019
Tracked Since
Feb 18, 2026