CVE-2020-1712

HIGH

systemd <v245-rc1 - Use After Free

Title source: llm
STIX 2.1

Description

A heap use-after-free vulnerability was found in systemd before version v245-rc1, where asynchronous Polkit queries are performed while handling dbus messages. A local unprivileged attacker can abuse this flaw to crash systemd services or potentially execute code and elevate their privileges, by sending specially crafted dbus messages.

References (7)

Core 7
Core References
Issue Tracking, Patch, Third Party Advisory x_refsource_confirm
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1712
Mailing List, Patch, Third Party Advisory x_refsource_confirm
https://www.openwall.com/lists/oss-security/2020/02/05/1
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2022/06/msg00025.html

Scores

CVSS v3 7.8
EPSS 0.0010
EPSS Percentile 28.1%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-416
Status published
Products (7)
debian/debian_linux 9.0
redhat/ceph_storage 4.0
redhat/discovery
redhat/enterprise_linux 8.0
redhat/migration_toolkit 1.0
redhat/openshift_container_platform 4.0
systemd_project/systemd < 244
Published Mar 31, 2020
Tracked Since Feb 18, 2026