CVE-2017-1000082
Publication date 7 July 2017
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
systemd v233 and earlier fails to safely parse usernames starting with a numeric digit (e.g. "0day"), running the service in question with root privileges rather than the user intended.
Status
Package | Ubuntu Release | Status |
---|---|---|
systemd | ||
16.04 LTS xenial | Ignored | |
14.04 LTS trusty |
Not affected
|
Notes
mdeslaur
the upstream patch changes behaviour to cause a unit to fail to load if a configuration item could not be parsed, instead of skipping it. Fixing this may cause regressions in certain environments. We will not be fixing this issue in xenial. Administrators are encouraged to carefully audit their unit files and make sure the options are being parsed correctly.
Severity score breakdown
Parameter | Value |
---|---|
Base score | 9.8 · Critical |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |