CVE-2018-1124

EUVD-2018-11768
procps-ng before version 3.3.15 is vulnerable to multiple integer overflows leading to a heap corruption in file2strvec function. This allows a privilege escalation for a local attacker who can create entries in procfs by starting processes, which could result in crashes or arbitrary code execution in proc utilities run by other users.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.8 HIGH
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
redhatCNA
7.3 HIGH
LOCAL
LOW
LOW
CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 62%
Affected Products (NVD)
VendorProductVersion
procps-ng_projectprocps-ng
𝑥
< 3.3.15
canonicalubuntu_linux
14.04
canonicalubuntu_linux
16.04
canonicalubuntu_linux
17.10
canonicalubuntu_linux
18.04
debiandebian_linux
7.0
debiandebian_linux
8.0
debiandebian_linux
9.0
redhatenterprise_linux
6.0
redhatenterprise_linux
7.0
redhatenterprise_linux
7.5
redhatenterprise_linux_desktop
6.0
redhatenterprise_linux_desktop
7.0
redhatenterprise_linux_server
6.0
redhatenterprise_linux_server
7.0
redhatenterprise_linux_workstation
6.0
redhatenterprise_linux_workstation
7.0
schneider-electricstruxureware_data_center_expert
𝑥
< 7.6.0
opensuseleap
15.0
opensuseleap
15.1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
procps
bookworm
2:4.0.2-3
fixed
bullseye
2:3.3.17-5
fixed
sid
2:4.0.4-6
fixed
trixie
2:4.0.4-6
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
procps
artful
Fixed 2:3.3.12-1ubuntu2.1
released
bionic
Fixed 2:3.3.12-3ubuntu1.1
released
trusty
Fixed 1:3.3.9-1ubuntu2.3
released
xenial
Fixed 2:3.3.10-4ubuntu2.4
released
References