Integer overflow in the valid_user_field function in journal/journald-native.c in systemd allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large journal data field, which triggers a heap-based buffer overflow.
References
Link | Resource |
---|---|
http://cgit.freedesktop.org/systemd/systemd/commit/?id=505b6a61c22d5565e9308045c7b9bf79f7d0517e | Exploit Patch Vendor Advisory |
http://www.openwall.com/lists/oss-security/2013/10/01/9 | Mailing List Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=859051 | Issue Tracking Patch Third Party Advisory |
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357 | Issue Tracking Mailing List Patch Third Party Advisory |
http://www.debian.org/security/2013/dsa-2777 | Third Party Advisory |
https://security.gentoo.org/glsa/201612-34 | Third Party Advisory |
Information
Published : 2013-10-28 15:55
Updated : 2022-01-31 09:41
NVD link : CVE-2013-4391
Mitre link : CVE-2013-4391
JSON object : View
CWE
CWE-190
Integer Overflow or Wraparound
Products Affected
debian
- debian_linux
systemd_project
- systemd