4.4
CVSSv2

CVE-2018-1122

Published: 23/05/2018 Updated: 03/10/2019
CVSS v2 Base Score: 4.4 | Impact Score: 6.4 | Exploitability Score: 3.4
CVSS v3 Base Score: 7 | Impact Score: 5.9 | Exploitability Score: 1
VMScore: 445
Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

procps-ng before version 3.3.15 is vulnerable to a local privilege escalation in top. If a user runs top with HOME unset in an attacker-controlled directory, the attacker could achieve privilege escalation by exploiting one of several vulnerabilities in the config_file() function.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

procps-ng project procps-ng

canonical ubuntu linux 12.04

canonical ubuntu linux 14.04

canonical ubuntu linux 16.04

canonical ubuntu linux 18.04

canonical ubuntu linux 17.10

debian debian linux 7.0

debian debian linux 8.0

debian debian linux 9.0

Vendor Advisories

Debian Bug report logs - #899170 procps: CVE-2018-1122 CVE-2018-1123 CVE-2018-1124 CVE-2018-1125 CVE-2018-1126 Package: src:procps; Maintainer for src:procps is Craig Small <csmall@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sun, 20 May 2018 09:30:01 UTC Severity: important Tags: security ...
Synopsis Moderate: procps-ng security and bug fix update Type/Severity Security Advisory: Moderate Topic An update for procps-ng is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring System (CVSS ...
Synopsis Moderate: procps-ng security update Type/Severity Security Advisory: Moderate Topic An update for procps-ng is now available for Red Hat Enterprise Linux 75 Extended Update SupportRed Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scorin ...
Synopsis Moderate: procps-ng security update Type/Severity Security Advisory: Moderate Topic An update for procps-ng is now available for Red Hat Enterprise Linux 74 Advanced Update Support, Red Hat Enterprise Linux 74 Telco Extended Update Support, and Red Hat Enterprise Linux 74 Update Services for SAP ...
Synopsis Moderate: procps-ng security update Type/Severity Security Advisory: Moderate Topic An update for procps-ng is now available for Red Hat Enterprise Linux 76 Extended Update SupportRed Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scorin ...
The Qualys Research Labs discovered multiple vulnerabilities in procps, a set of command line and full screen utilities for browsing procfs The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2018-1122 top read its configuration from the current working directory if no $HOME was configured If top were ...
Several security issues were fixed in procps-ng ...
Several security issues were fixed in procps-ng ...
If the HOME environment variable is unset or empty, top will read its configuration file from the current working directory without any security check If a user runs top with HOME unset in an attacker-controlled directory, the attacker could achieve privilege escalation by exploiting one of several vulnerabilities in the config_file() function(CV ...
If the HOME environment variable is unset or empty, top will read its configuration file from the current working directory without any security check If a user runs top with HOME unset in an attacker-controlled directory, the attacker could achieve privilege escalation by exploiting one of several vulnerabilities in the config_file() function ...
The top utility from procps-ng <= 3314 reads its configuration file from the current working directory, without any security check, if the HOME environment variable is unset or empty In this very unlikely scenario, an attacker can carry out an LPE (Local Privilege Escalation) if an administrator executes top in /tmp (for example), by exploiti ...

Exploits

Qualys Security Advisory Procps-ng Audit Report ======================================================================== Contents ======================================================================== Summary 1 FUSE-backed /proc/PID/cmdline 2 Unprivileged process hiding 3 Local Privilege Escalation in top (Low Impact) 4 Denial of Service ...
Qualys performed an extensive audit of procps-ng They discovered hundreds of bugs and vulnerabilities ...