← Voltar para CVEs
CVE-2018-1124
HIGH7.8
Descricao
procps-ng before version 3.3.15 is vulnerable to multiple integer overflows leading to a heap corruption in file2strvec function. This allows a privilege escalation for a local attacker who can create entries in procfs by starting processes, which could result in crashes or arbitrary code execution in proc utilities run by other users.
Detalhes CVE
Pontuacao CVSS v3.17.8
SeveridadeHIGH
Vetor CVSSCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Vetor de ataqueLOCAL
ComplexidadeLOW
Privilegios necessariosLOW
Interacao do usuarioNONE
Publicado5/23/2018
Ultima modificacao11/21/2024
Fontenvd
Avistamentos honeypot0
Produtos afetados
canonical:ubuntu_linuxdebian:debian_linuxopensuse:leapprocps-ng_project:procps-ngredhat:enterprise_linuxredhat:enterprise_linux_desktopredhat:enterprise_linux_serverredhat:enterprise_linux_workstationschneider-electric:struxureware_data_center_expert
Fraquezas (CWE)
CWE-122CWE-190CWE-190CWE-787
Referencias
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html(secalert@redhat.com)
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html(secalert@redhat.com)
http://seclists.org/oss-sec/2018/q2/122(secalert@redhat.com)
http://www.securityfocus.com/bid/104214(secalert@redhat.com)
http://www.securitytracker.com/id/1041057(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2018:1700(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2018:1777(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2018:1820(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2018:2267(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2018:2268(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2019:1944(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2019:2401(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1124(secalert@redhat.com)
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0(secalert@redhat.com)
https://kc.mcafee.com/corporate/index?page=content&id=SB10241(secalert@redhat.com)
https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html(secalert@redhat.com)
https://security.gentoo.org/glsa/201805-14(secalert@redhat.com)
https://usn.ubuntu.com/3658-1/(secalert@redhat.com)
https://usn.ubuntu.com/3658-2/(secalert@redhat.com)
https://www.debian.org/security/2018/dsa-4208(secalert@redhat.com)
https://www.exploit-db.com/exploits/44806/(secalert@redhat.com)
https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt(secalert@redhat.com)
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html(af854a3a-2127-422b-91ae-364da2661108)
http://seclists.org/oss-sec/2018/q2/122(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/104214(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1041057(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1700(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1777(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1820(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2267(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2268(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:1944(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:2401(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1124(af854a3a-2127-422b-91ae-364da2661108)
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0(af854a3a-2127-422b-91ae-364da2661108)
https://kc.mcafee.com/corporate/index?page=content&id=SB10241(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/201805-14(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3658-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3658-2/(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2018/dsa-4208(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/44806/(af854a3a-2127-422b-91ae-364da2661108)
https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.