• Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      •     SOC Maturity Assessment
      •     SOC Model Evaluation
      •     SOC Gap Analysis
      •     SIEM Gap Analysis
      •     SIEM Optimization
      •     SOC Content Pack
    • Train
      • Security Awareness and Training
      • Tabletop Exercise
      • Simulated Cyber Attack Exercises
    • Respond
      • Incident Response
      • Incident Analysis
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
Rewterz Threat Advisory – CVE-2018-5848 – Linux Kernel ‘wmi_set_ie()’ Buffer Overflow Vulnerability
December 6, 2018
Rewterz Threat Advisory – Satan Ransomware Variant Exploits 10 Server-Side Flaws
December 11, 2018

REWTERZ THREAT ADVISORY – CVE-2018-19788 – LINUX POLICYKIT Command Execution Vulnerability

December 10, 2018

A new vulnerability allows a low-privileged user account on most Linux operating systems with UID value greater than 2147483647 to execute any systemctl command.

 

 

IMPACT:  MEDIUM

 

 

PUBLISH DATE:  10-DECEMBER-2018

 

 

OVERVIEW

 

 

A flaw was found in PolicyKit in Linux (aka polkit) 0.115 that allows a user with a UID greater than INT_MAX to successfully execute any systemctl command, which means privilege escalation.

 

 

ANALYSIS

 

 

The vulnerability is reported to be in PolicyKit, an application-level toolkit for Unix-like operating systems that defines policies, handles system privileges and serves as communication medium between non-privileged and privileged processes.

 

 

PolicyKit’s improper validation of permission requests for any low-privileged user with UID greater than INT_MAX results in this flaw. INT_MAX is a constant in computer programming that defines what maximum value an integer variable can store, which equals to 2147483647 (in hexadecimal 0x7FFFFFFF).

 

 

Thus, a user account created on an affected Linux system with any UID greater than INT_MAX value will be allowed by the PolicyKit to successfully execute any systemctl command.

 

 

AFFECTED PRODUCTS

 

 

PolicyKit version 0.115

 

(It’s preinstalled on most popular Linux distributions)

 

 

MITIGATION

 

 

The flaw is fixed in versions policykit-1/0.105-18+deb9u1, policykit-1/0.105-23, policykit-1/0.115-3.

Upgrade your policykit-1 packages.

 

 

It is also recommended that system administrators should not allow any negative UIDs or UIDs greater than 2147483646 in order to avoid falling victim to this vulnerability.

 

 

 

If you think you are a victim of a cyber-attack, immediately send an e-mail to soc@rewterz.com.

  • Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Respond
      • Incident Response
      • Incident Analysis
  • Transform
    • SOC Consultancy
    •     SOC Maturity Assessment
    •     SOC Model Evaluation
    •     SOC Gap Analysis
    •     SIEM Gap Analysis
    •     SIEM Optimization
    •     SOC Content Pack
  • Train
    • Security Awareness and Training
    • Tabletop Exercise
    • Simulated Cyber Attack Exercises
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.