{
  "threat_severity" : "Important",
  "public_date" : "2019-01-09T18:00:00Z",
  "bugzilla" : {
    "description" : "systemd: stack overflow when calling syslog from a command with long cmdline",
    "id" : "1653855",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1653855"
  },
  "cvss3" : {
    "cvss3_base_score" : "7.4",
    "cvss3_scoring_vector" : "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-770",
  "details" : [ "An allocation of memory without limits, that could result in the stack clashing with another memory region, was discovered in systemd-journald when a program with long command line arguments calls syslog. A local attacker may use this flaw to crash systemd-journald or escalate his privileges. Versions through v240 are vulnerable.", "An allocation of memory without limits, that could result in the stack clashing with another memory region, was discovered in systemd-journald when a program with long command line arguments calls syslog. A local attacker may use this flaw to crash systemd-journald or escalate privileges." ],
  "statement" : "This issue affects the versions of systemd as shipped with Red Hat Enterprise Linux 7. Red Hat Product Security has rated this issue as having a security impact of Important because it allows a local attacker to crash systemd-journald or escalate his privileges. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
  "acknowledgement" : "Red Hat would like to thank Qualys Research Labs for reporting this issue.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 7",
    "release_date" : "2019-01-14T00:00:00Z",
    "advisory" : "RHSA-2019:0049",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7",
    "package" : "systemd-0:219-62.el7_6.2"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7.3 Advanced Update Support",
    "release_date" : "2019-08-07T00:00:00Z",
    "advisory" : "RHSA-2019:2402",
    "cpe" : "cpe:/o:redhat:rhel_aus:7.3",
    "package" : "systemd-0:219-30.el7_3.13"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7.3 Telco Extended Update Support",
    "release_date" : "2019-08-07T00:00:00Z",
    "advisory" : "RHSA-2019:2402",
    "cpe" : "cpe:/o:redhat:rhel_tus:7.3",
    "package" : "systemd-0:219-30.el7_3.13"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7.3 Update Services for SAP Solutions",
    "release_date" : "2019-08-07T00:00:00Z",
    "advisory" : "RHSA-2019:2402",
    "cpe" : "cpe:/o:redhat:rhel_e4s:7.3",
    "package" : "systemd-0:219-30.el7_3.13"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7.4 Extended Update Support",
    "release_date" : "2019-02-04T00:00:00Z",
    "advisory" : "RHSA-2019:0271",
    "cpe" : "cpe:/o:redhat:rhel_eus:7.4",
    "package" : "systemd-0:219-42.el7_4.13"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7.5 Extended Update Support",
    "release_date" : "2019-01-29T00:00:00Z",
    "advisory" : "RHSA-2019:0204",
    "cpe" : "cpe:/o:redhat:rhel_eus:7.5",
    "package" : "systemd-0:219-57.el7_5.5"
  }, {
    "product_name" : "Red Hat Virtualization 4 for Red Hat Enterprise Linux 7",
    "release_date" : "2019-02-13T00:00:00Z",
    "advisory" : "RHSA-2019:0342",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7::hypervisor",
    "package" : "redhat-release-virtualization-host-0:4.2-8.1.el7",
    "impact" : "moderate"
  }, {
    "product_name" : "Red Hat Virtualization 4 for Red Hat Enterprise Linux 7",
    "release_date" : "2019-02-13T00:00:00Z",
    "advisory" : "RHSA-2019:0342",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7::hypervisor",
    "package" : "redhat-virtualization-host-0:4.2-20190129.0.el7_6",
    "impact" : "moderate"
  }, {
    "product_name" : "Red Hat Virtualization 4 for Red Hat Enterprise Linux 7",
    "release_date" : "2019-02-18T00:00:00Z",
    "advisory" : "RHSA-2019:0361",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7::hypervisor",
    "package" : "rhvm-appliance-0:4.2-20190129.0.el7",
    "impact" : "moderate"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Not affected",
    "package_name" : "systemd",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2018-16864\nhttps://nvd.nist.gov/vuln/detail/CVE-2018-16864\nhttps://www.qualys.com/2019/01/09/system-down/system-down.txt" ],
  "name" : "CVE-2018-16864",
  "mitigation" : {
    "value" : "To increase the time an attacker needs to exploit this flaw you could override the `StartLimitInterval=` (called StartLimitIntervalSec in newer systemd versions) and `StartLimitBurst=` settings. In this way the attack may require much longer to be successful.\nTo edit the journald service use `sudo systemctl edit systemd-journald.service` and add:\n```\n[Service]\nStartLimitInterval=120\nStartLimitBurst=3\n```",
    "lang" : "en:us"
  },
  "csaw" : false
}