CVE-2018-1123

procps-ng before version 3.3.15 is vulnerable to a denial of service in ps via mmap buffer overflow. Inbuilt protection in ps maps a guard page at the end of the overflowed buffer, ensuring that the impact of this flaw is limited to a crash (temporary denial of service).
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
3.9 LOW
LOCAL
LOW
LOW
CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L
redhatCNA
3.9 LOW
LOCAL
LOW
LOW
CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 87%
VendorProductVersion
procps-ng_projectprocps-ng
𝑥
< 3.3.15
canonicalubuntu_linux
12.04
canonicalubuntu_linux
14.04
canonicalubuntu_linux
16.04
canonicalubuntu_linux
17.10
canonicalubuntu_linux
18.04
debiandebian_linux
7.0
debiandebian_linux
8.0
debiandebian_linux
9.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
procps
bullseye
2:3.3.17-5
fixed
bookworm
2:4.0.2-3
fixed
sid
2:4.0.4-6
fixed
trixie
2:4.0.4-6
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
procps
bionic
Fixed 2:3.3.12-3ubuntu1.1
released
artful
Fixed 2:3.3.12-1ubuntu2.1
released
xenial
Fixed 2:3.3.10-4ubuntu2.4
released
trusty
Fixed 1:3.3.9-1ubuntu2.3
released
References