← Back to CVEs
CVE-2018-1124
HIGH7.8
Description
procps-ng before version 3.3.15 is vulnerable to multiple integer overflows leading to a heap corruption in file2strvec function. This allows a privilege escalation for a local attacker who can create entries in procfs by starting processes, which could result in crashes or arbitrary code execution in proc utilities run by other users.
CVE Details
CVSS v3.1 Score7.8
SeverityHIGH
CVSS VectorCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack VectorLOCAL
ComplexityLOW
Privileges RequiredLOW
User InteractionNONE
Published5/23/2018
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
canonical:ubuntu_linuxdebian:debian_linuxopensuse:leapprocps-ng_project:procps-ngredhat:enterprise_linuxredhat:enterprise_linux_desktopredhat:enterprise_linux_serverredhat:enterprise_linux_workstationschneider-electric:struxureware_data_center_expert
Weaknesses (CWE)
CWE-122CWE-190CWE-190CWE-787
References
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html(secalert@redhat.com)
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html(secalert@redhat.com)
http://seclists.org/oss-sec/2018/q2/122(secalert@redhat.com)
http://www.securityfocus.com/bid/104214(secalert@redhat.com)
http://www.securitytracker.com/id/1041057(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2018:1700(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2018:1777(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2018:1820(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2018:2267(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2018:2268(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2019:1944(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2019:2401(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1124(secalert@redhat.com)
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0(secalert@redhat.com)
https://kc.mcafee.com/corporate/index?page=content&id=SB10241(secalert@redhat.com)
https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html(secalert@redhat.com)
https://security.gentoo.org/glsa/201805-14(secalert@redhat.com)
https://usn.ubuntu.com/3658-1/(secalert@redhat.com)
https://usn.ubuntu.com/3658-2/(secalert@redhat.com)
https://www.debian.org/security/2018/dsa-4208(secalert@redhat.com)
https://www.exploit-db.com/exploits/44806/(secalert@redhat.com)
https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt(secalert@redhat.com)
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html(af854a3a-2127-422b-91ae-364da2661108)
http://seclists.org/oss-sec/2018/q2/122(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/104214(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1041057(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1700(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1777(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1820(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2267(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2268(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:1944(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:2401(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1124(af854a3a-2127-422b-91ae-364da2661108)
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0(af854a3a-2127-422b-91ae-364da2661108)
https://kc.mcafee.com/corporate/index?page=content&id=SB10241(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/201805-14(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3658-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3658-2/(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2018/dsa-4208(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/44806/(af854a3a-2127-422b-91ae-364da2661108)
https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.