CVE-2018-1122

procps-ng before version 3.3.15 is vulnerable to a local privilege escalation in top. If a user runs top with HOME unset in an attacker-controlled directory, the attacker could achieve privilege escalation by exploiting one of several vulnerabilities in the config_file() function.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.3 HIGH
LOCAL
LOW
LOW
CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
redhatCNA
7.3 HIGH
LOCAL
LOW
LOW
CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 59%
VendorProductVersion
procps-ng_projectprocps-ng
𝑥
< 3.3.15
canonicalubuntu_linux
12.04
canonicalubuntu_linux
14.04
canonicalubuntu_linux
16.04
canonicalubuntu_linux
17.10
canonicalubuntu_linux
18.04
debiandebian_linux
7.0
debiandebian_linux
8.0
debiandebian_linux
9.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
procps
bullseye
2:3.3.17-5
fixed
bookworm
2:4.0.2-3
fixed
sid
2:4.0.4-6
fixed
trixie
2:4.0.4-6
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
procps
bionic
Fixed 2:3.3.12-3ubuntu1.1
released
artful
Fixed 2:3.3.12-1ubuntu2.1
released
xenial
Fixed 2:3.3.10-4ubuntu2.4
released
trusty
Fixed 1:3.3.9-1ubuntu2.3
released