← Retour aux CVEs
CVE-2018-1124
HIGH7.8
Description
procps-ng before version 3.3.15 is vulnerable to multiple integer overflows leading to a heap corruption in file2strvec function. This allows a privilege escalation for a local attacker who can create entries in procfs by starting processes, which could result in crashes or arbitrary code execution in proc utilities run by other users.
Details CVE
Score CVSS v3.17.8
SeveriteHIGH
Vecteur CVSSCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Vecteur d'attaqueLOCAL
ComplexiteLOW
Privileges requisLOW
Interaction utilisateurNONE
Publie5/23/2018
Derniere modification11/21/2024
Sourcenvd
Observations honeypot0
Produits affectes
canonical:ubuntu_linuxdebian:debian_linuxopensuse:leapprocps-ng_project:procps-ngredhat:enterprise_linuxredhat:enterprise_linux_desktopredhat:enterprise_linux_serverredhat:enterprise_linux_workstationschneider-electric:struxureware_data_center_expert
Faiblesses (CWE)
CWE-122CWE-190CWE-190CWE-787
References
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html(secalert@redhat.com)
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html(secalert@redhat.com)
http://seclists.org/oss-sec/2018/q2/122(secalert@redhat.com)
http://www.securityfocus.com/bid/104214(secalert@redhat.com)
http://www.securitytracker.com/id/1041057(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2018:1700(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2018:1777(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2018:1820(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2018:2267(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2018:2268(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2019:1944(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2019:2401(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1124(secalert@redhat.com)
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0(secalert@redhat.com)
https://kc.mcafee.com/corporate/index?page=content&id=SB10241(secalert@redhat.com)
https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html(secalert@redhat.com)
https://security.gentoo.org/glsa/201805-14(secalert@redhat.com)
https://usn.ubuntu.com/3658-1/(secalert@redhat.com)
https://usn.ubuntu.com/3658-2/(secalert@redhat.com)
https://www.debian.org/security/2018/dsa-4208(secalert@redhat.com)
https://www.exploit-db.com/exploits/44806/(secalert@redhat.com)
https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt(secalert@redhat.com)
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html(af854a3a-2127-422b-91ae-364da2661108)
http://seclists.org/oss-sec/2018/q2/122(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/104214(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1041057(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1700(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1777(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1820(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2267(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2268(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:1944(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:2401(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1124(af854a3a-2127-422b-91ae-364da2661108)
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0(af854a3a-2127-422b-91ae-364da2661108)
https://kc.mcafee.com/corporate/index?page=content&id=SB10241(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/201805-14(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3658-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3658-2/(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2018/dsa-4208(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/44806/(af854a3a-2127-422b-91ae-364da2661108)
https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.