CVE-2018-0493

remctld in remctl before 3.14, when an attacker is authorized to execute a command that uses the sudo option, has a use-after-free that leads to a daemon crash, memory corruption, or arbitrary command execution.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.2 HIGH
NETWORK
LOW
HIGH
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
debianCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 76%
VendorProductVersion
eyrieremctl
𝑥
< 3.14
debiandebian_linux
9.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
remctl
bullseye
3.17-1
fixed
jessie
not-affected
wheezy
not-affected
bookworm
3.18-1
fixed
sid
3.18-1.1
fixed
trixie
3.18-1.1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
remctl
noble
Fixed 3.13-1+deb9u1
released
mantic
Fixed 3.13-1+deb9u1
released
lunar
Fixed 3.13-1+deb9u1
released
kinetic
Fixed 3.13-1+deb9u1
released
jammy
Fixed 3.13-1+deb9u1
released
impish
Fixed 3.13-1+deb9u1
released
hirsute
Fixed 3.13-1+deb9u1
released
groovy
Fixed 3.13-1+deb9u1
released
focal
Fixed 3.13-1+deb9u1
released
eoan
Fixed 3.13-1+deb9u1
released
disco
Fixed 3.13-1+deb9u1
released
cosmic
Fixed 3.13-1+deb9u1
released
bionic
Fixed 3.13-1+deb9u1
released
artful
Fixed 3.13-1+deb9u1~build0.17.10.1
released
xenial
needed
trusty
dne