7.8
CVSSv3

CVE-2018-1124

Published: 23/05/2018 Updated: 09/09/2020
CVSS v2 Base Score: 4.6 | Impact Score: 6.4 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 465
Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

procps-ng before version 3.3.15 is vulnerable to multiple integer overflows leading to a heap corruption in file2strvec function. This allows a privilege escalation for a local attacker who can create entries in procfs by starting processes, which could result in crashes or arbitrary code execution in proc utilities run by other users.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

procps-ng project procps-ng

canonical ubuntu linux 16.04

canonical ubuntu linux 14.04

canonical ubuntu linux 18.04

canonical ubuntu linux 17.10

debian debian linux 7.0

debian debian linux 9.0

debian debian linux 8.0

redhat enterprise linux desktop 7.0

redhat enterprise linux server 6.0

redhat enterprise linux 6.0

redhat enterprise linux workstation 7.0

redhat enterprise linux 7.5

redhat enterprise linux 7.0

redhat enterprise linux workstation 6.0

redhat enterprise linux server 7.0

redhat enterprise linux desktop 6.0

schneider-electric struxureware data center expert

opensuse leap 15.0

opensuse leap 15.1

Vendor Advisories

Debian Bug report logs - #899170 procps: CVE-2018-1122 CVE-2018-1123 CVE-2018-1124 CVE-2018-1125 CVE-2018-1126 Package: src:procps; Maintainer for src:procps is Craig Small <csmall@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sun, 20 May 2018 09:30:01 UTC Severity: important Tags: security ...
The Qualys Research Labs discovered multiple vulnerabilities in procps, a set of command line and full screen utilities for browsing procfs The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2018-1122 top read its configuration from the current working directory if no $HOME was configured If top were ...
Several security issues were fixed in procps-ng ...
Several security issues were fixed in procps-ng ...
Synopsis Important: Red Hat Virtualization security, bug fix, and enhancement update Type/Severity Security Advisory: Important Topic An update for imgbased, redhat-release-virtualization-host, and redhat-virtualization-host is now available for Red Hat Virtualization 4 for RHEL-7Red Hat Product Security h ...
Synopsis Important: procps-ng security update Type/Severity Security Advisory: Important Topic An update for procps-ng is now available for Red Hat Enterprise Linux 73 Advanced Update Support, Red Hat Enterprise Linux 73 Telco Extended Update Support, and Red Hat Enterprise Linux 73 Update Services for S ...
Synopsis Important: procps security update Type/Severity Security Advisory: Important Topic An update for procps is now available for Red Hat Enterprise Linux 66 Advanced Update Support and Red Hat Enterprise Linux 66 Telco Extended Update SupportRed Hat Product Security has rated this update as having a ...
Synopsis Important: procps-ng security update Type/Severity Security Advisory: Important Topic An update for procps-ng is now available for Red Hat Enterprise Linux 74 Extended Update SupportRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Sco ...
Synopsis Important: procps security update Type/Severity Security Advisory: Important Topic An update for procps is now available for Red Hat Enterprise Linux 6Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) base score, w ...
Synopsis Important: procps security update Type/Severity Security Advisory: Important Topic An update for procps is now available for Red Hat Enterprise Linux 67 Extended Update SupportRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring S ...
Synopsis Important: procps-ng security update Type/Severity Security Advisory: Important Topic An update for procps-ng is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) base sc ...
Multiple integer overflows leading to heap corruption flaws were discovered in file2strvec() These vulnerabilities can lead to privilege escalation for a local attacker who can create entries in procfs by starting processes, which will lead to crashes or arbitrary code execution in proc utilities run by other users (eg pgrep, pkill, pidof, w)(CVE ...
Multiple integer overflows leading to heap corruption flaws were discovered in file2strvec() These vulnerabilities can lead to privilege escalation for a local attacker who can create entries in procfs by starting processes, which will lead to crashes or arbitrary code execution in proc utilities run by other users (eg pgrep, pkill, pidof, w) ...
A security issue has been found in procps-ng <= 3314 An attacker can exploit an integer overflow in libprocps's file2strvec() function and carry out an LPE when another user, administrator, or script executes a vulnerable utility (pgrep, pidof, pkill, and w are vulnerable by default; other utilities are vulnerable if executed with non-default ...

Exploits

Qualys Security Advisory Procps-ng Audit Report ======================================================================== Contents ======================================================================== Summary 1 FUSE-backed /proc/PID/cmdline 2 Unprivileged process hiding 3 Local Privilege Escalation in top (Low Impact) 4 Denial of Service ...
Qualys performed an extensive audit of procps-ng They discovered hundreds of bugs and vulnerabilities ...