Vulnerability Details CVE-2019-6454
An issue was discovered in sd-bus in systemd 239. bus_process_object() in libsystemd/sd-bus/bus-objects.c allocates a variable-length stack buffer for temporarily storing the object path of incoming D-Bus messages. An unprivileged local user can exploit this by sending a specially crafted message to PID1, causing the stack pointer to jump over the stack guard pages into an unmapped memory region and trigger a denial of service (systemd PID1 crash and kernel panic).
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 28.1%
CVSS Severity
CVSS v3 Score 5.5
CVSS v2 Score 4.9
Products affected by CVE-2019-6454
-
cpe:2.3:a:mcafee:web_gateway:7.0.0
-
cpe:2.3:a:mcafee:web_gateway:7.2.0.1
-
cpe:2.3:a:mcafee:web_gateway:7.2.0.2
-
cpe:2.3:a:mcafee:web_gateway:7.2.0.3
-
cpe:2.3:a:mcafee:web_gateway:7.2.0.4
-
cpe:2.3:a:mcafee:web_gateway:7.2.0.5
-
cpe:2.3:a:mcafee:web_gateway:7.2.0.6
-
cpe:2.3:a:mcafee:web_gateway:7.2.0.7
-
cpe:2.3:a:mcafee:web_gateway:7.2.0.8
-
cpe:2.3:a:mcafee:web_gateway:7.2.0.9
-
cpe:2.3:a:mcafee:web_gateway:7.3.0
-
cpe:2.3:a:mcafee:web_gateway:7.3.2
-
cpe:2.3:a:mcafee:web_gateway:7.3.2.4
-
cpe:2.3:a:mcafee:web_gateway:7.3.2.6
-
cpe:2.3:a:mcafee:web_gateway:7.3.2.8
-
cpe:2.3:a:mcafee:web_gateway:7.3.2.9.
-
cpe:2.3:a:mcafee:web_gateway:7.4.0
-
cpe:2.3:a:mcafee:web_gateway:7.4.1
-
cpe:2.3:a:mcafee:web_gateway:7.4.1.3
-
cpe:2.3:a:mcafee:web_gateway:7.4.2
-
cpe:2.3:a:mcafee:web_gateway:7.5.0.0
-
cpe:2.3:a:mcafee:web_gateway:7.5.1
-
cpe:2.3:a:mcafee:web_gateway:7.5.2
-
cpe:2.3:a:mcafee:web_gateway:7.5.2.10
-
cpe:2.3:a:mcafee:web_gateway:7.5.2.11
-
cpe:2.3:a:mcafee:web_gateway:7.5.2.8
-
cpe:2.3:a:mcafee:web_gateway:7.6.0.0
-
cpe:2.3:a:mcafee:web_gateway:7.6.0.1
-
cpe:2.3:a:mcafee:web_gateway:7.6.1
-
cpe:2.3:a:mcafee:web_gateway:7.6.1.1
-
cpe:2.3:a:mcafee:web_gateway:7.6.1.2
-
cpe:2.3:a:mcafee:web_gateway:7.6.1.3
-
cpe:2.3:a:mcafee:web_gateway:7.6.2
-
cpe:2.3:a:mcafee:web_gateway:7.6.2.1
-
cpe:2.3:a:mcafee:web_gateway:7.6.2.10
-
cpe:2.3:a:mcafee:web_gateway:7.6.2.11
-
cpe:2.3:a:mcafee:web_gateway:7.6.2.12
-
cpe:2.3:a:mcafee:web_gateway:7.6.2.13
-
cpe:2.3:a:mcafee:web_gateway:7.6.2.14
-
cpe:2.3:a:mcafee:web_gateway:7.6.2.15
-
cpe:2.3:a:mcafee:web_gateway:7.6.2.16
-
cpe:2.3:a:mcafee:web_gateway:7.6.2.17
-
cpe:2.3:a:mcafee:web_gateway:7.6.2.18
-
cpe:2.3:a:mcafee:web_gateway:7.6.2.19
-
cpe:2.3:a:mcafee:web_gateway:7.6.2.2
-
cpe:2.3:a:mcafee:web_gateway:7.6.2.3
-
cpe:2.3:a:mcafee:web_gateway:7.6.2.4
-
cpe:2.3:a:mcafee:web_gateway:7.6.2.5
-
cpe:2.3:a:mcafee:web_gateway:7.6.2.6
-
cpe:2.3:a:mcafee:web_gateway:7.6.2.7
-
cpe:2.3:a:mcafee:web_gateway:7.6.2.8
-
cpe:2.3:a:mcafee:web_gateway:7.6.2.9
-
cpe:2.3:a:mcafee:web_gateway:7.7.0
-
cpe:2.3:a:mcafee:web_gateway:7.7.0.0
-
cpe:2.3:a:mcafee:web_gateway:7.7.0.1
-
cpe:2.3:a:mcafee:web_gateway:7.7.0.2
-
cpe:2.3:a:mcafee:web_gateway:7.7.0.3
-
cpe:2.3:a:mcafee:web_gateway:7.7.1
-
cpe:2.3:a:mcafee:web_gateway:7.7.1.1
-
cpe:2.3:a:mcafee:web_gateway:7.7.1.2
-
cpe:2.3:a:mcafee:web_gateway:7.7.1.3
-
cpe:2.3:a:mcafee:web_gateway:7.7.1.4
-
cpe:2.3:a:mcafee:web_gateway:7.7.1.5
-
cpe:2.3:a:mcafee:web_gateway:7.7.2
-
cpe:2.3:a:mcafee:web_gateway:7.7.2.0
-
cpe:2.3:a:mcafee:web_gateway:7.7.2.1
-
cpe:2.3:a:mcafee:web_gateway:7.7.2.10
-
cpe:2.3:a:mcafee:web_gateway:7.7.2.11
-
cpe:2.3:a:mcafee:web_gateway:7.7.2.12
-
cpe:2.3:a:mcafee:web_gateway:7.7.2.13
-
cpe:2.3:a:mcafee:web_gateway:7.7.2.14
-
cpe:2.3:a:mcafee:web_gateway:7.7.2.15
-
cpe:2.3:a:mcafee:web_gateway:7.7.2.16
-
cpe:2.3:a:mcafee:web_gateway:7.7.2.17
-
cpe:2.3:a:mcafee:web_gateway:7.7.2.18
-
cpe:2.3:a:mcafee:web_gateway:7.7.2.19
-
cpe:2.3:a:mcafee:web_gateway:7.7.2.2
-
cpe:2.3:a:mcafee:web_gateway:7.7.2.20
-
cpe:2.3:a:mcafee:web_gateway:7.7.2.3
-
cpe:2.3:a:mcafee:web_gateway:7.7.2.4
-
cpe:2.3:a:mcafee:web_gateway:7.7.2.5
-
cpe:2.3:a:mcafee:web_gateway:7.7.2.6
-
cpe:2.3:a:mcafee:web_gateway:7.7.2.7
-
cpe:2.3:a:mcafee:web_gateway:7.7.2.8
-
cpe:2.3:a:mcafee:web_gateway:7.7.2.9
-
cpe:2.3:a:mcafee:web_gateway:7.8.0
-
cpe:2.3:a:mcafee:web_gateway:7.8.0.1
-
cpe:2.3:a:mcafee:web_gateway:7.8.0.2
-
cpe:2.3:a:mcafee:web_gateway:7.8.0.3
-
cpe:2.3:a:mcafee:web_gateway:7.8.1
-
cpe:2.3:a:mcafee:web_gateway:7.8.1.1
-
cpe:2.3:a:mcafee:web_gateway:7.8.1.2
-
cpe:2.3:a:mcafee:web_gateway:7.8.1.3
-
cpe:2.3:a:mcafee:web_gateway:7.8.1.4
-
cpe:2.3:a:mcafee:web_gateway:7.8.1.5
-
cpe:2.3:a:mcafee:web_gateway:7.8.1.6
-
cpe:2.3:a:mcafee:web_gateway:7.8.2
-
cpe:2.3:a:mcafee:web_gateway:7.8.2.0
-
cpe:2.3:a:mcafee:web_gateway:7.8.2.1
-
cpe:2.3:a:mcafee:web_gateway:7.8.2.2
-
cpe:2.3:a:mcafee:web_gateway:7.8.2.3
-
cpe:2.3:a:mcafee:web_gateway:7.8.2.4
-
cpe:2.3:a:mcafee:web_gateway:7.8.2.5
-
cpe:2.3:a:mcafee:web_gateway:7.8.2.6
-
cpe:2.3:a:mcafee:web_gateway:7.8.2.7
-
cpe:2.3:a:mcafee:web_gateway:8.0.0
-
cpe:2.3:a:mcafee:web_gateway:8.0.1
-
cpe:2.3:a:mcafee:web_gateway:8.0.2
-
cpe:2.3:a:mcafee:web_gateway:8.0.3
-
cpe:2.3:a:mcafee:web_gateway:8.1
-
cpe:2.3:a:mcafee:web_gateway:8.1.0
-
cpe:2.3:a:netapp:active_iq_performance_analytics_services:-
-
cpe:2.3:a:systemd_project:systemd:239
-
cpe:2.3:o:canonical:ubuntu_linux:16.04
-
cpe:2.3:o:canonical:ubuntu_linux:18.04
-
cpe:2.3:o:canonical:ubuntu_linux:18.10
-
cpe:2.3:o:debian:debian_linux:8.0
-
cpe:2.3:o:debian:debian_linux:9.0
-
cpe:2.3:o:fedoraproject:fedora:29
-
cpe:2.3:o:opensuse:leap:15.0
-
cpe:2.3:o:redhat:enterprise_linux:8.0
-
cpe:2.3:o:redhat:enterprise_linux_compute_node_eus:7.5
-
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0
-
cpe:2.3:o:redhat:enterprise_linux_eus:7.4
-
cpe:2.3:o:redhat:enterprise_linux_eus:7.5
-
cpe:2.3:o:redhat:enterprise_linux_eus:8.1
-
cpe:2.3:o:redhat:enterprise_linux_eus:8.2
-
cpe:2.3:o:redhat:enterprise_linux_eus:8.4
-
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.4
-
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.5
-
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.1
-
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.2
-
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.4
-
cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.4
-
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0
-
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.4
-
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.5
-
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.1
-
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.2
-
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.4
-
cpe:2.3:o:redhat:enterprise_linux_server:7.0
-
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3
-
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4
-
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6
-
cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2
-
cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4
-
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6
-
cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:7.3
-
cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:7.4
-
cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.0
-
cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.1
-
cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.2
-
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3
-
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4
-
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6
-
cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2
-
cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4
-
cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.3
-
cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.4
-
cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.0
-
cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.1
-
cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.2
-
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0