7.5
CVSSv3

CVE-2018-1125

Published: 23/05/2018 Updated: 09/09/2020
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 446
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

procps-ng before version 3.3.15 is vulnerable to a stack buffer overflow in pgrep. This vulnerability is mitigated by FORTIFY, as it involves strncat() to a stack-allocated string. When pgrep is compiled with FORTIFY (as on Red Hat Enterprise Linux and Fedora), the impact is limited to a crash.

Vulnerable Product Search on Vulmon Subscribe to Product

procps-ng project procps-ng

canonical ubuntu linux 14.04

canonical ubuntu linux 12.04

canonical ubuntu linux 18.04

canonical ubuntu linux 16.04

canonical ubuntu linux 17.10

debian debian linux 7.0

debian debian linux 9.0

debian debian linux 8.0

opensuse leap 15.1

Vendor Advisories

Debian Bug report logs - #899170 procps: CVE-2018-1122 CVE-2018-1123 CVE-2018-1124 CVE-2018-1125 CVE-2018-1126 Package: src:procps; Maintainer for src:procps is Craig Small <csmall@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sun, 20 May 2018 09:30:01 UTC Severity: important Tags: security ...
The Qualys Research Labs discovered multiple vulnerabilities in procps, a set of command line and full screen utilities for browsing procfs The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2018-1122 top read its configuration from the current working directory if no $HOME was configured If top were ...
Several security issues were fixed in procps-ng ...
Several security issues were fixed in procps-ng ...
If an argument longer than INT_MAX bytes is given to pgrep, "int bytes" could wrap around back to a large positive int (rather than approaching zero), leading to a stack buffer overflow via strncat() ...
A potential stack-based buffer overflow has been found in the pgrep utility of procps-ng <= 3314 If the strlen() of one of the cmdline arguments is greater than INT_MAX (it is possible), then the "int bytes" could wrap around completely, back to a very large positive int, and the next strncat() would be called with a huge number of destinatio ...

Exploits

Qualys performed an extensive audit of procps-ng They discovered hundreds of bugs and vulnerabilities ...