Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-1122

Опубликовано: 23 мая 2018
Источник: debian
EPSS Низкий

Описание

procps-ng before version 3.3.15 is vulnerable to a local privilege escalation in top. If a user runs top with HOME unset in an attacker-controlled directory, the attacker could achieve privilege escalation by exploiting one of several vulnerabilities in the config_file() function.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
procpsfixed2:3.3.15-1package

Примечания

  • https://www.openwall.com/lists/oss-security/2018/05/17/1

  • https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt

  • Patch: 0097-top-Do-not-default-to-the-cwd-in-configs_read.patch

  • https://gitlab.com/procps-ng/procps/commit/b45c4803dd176f4e3f9d3d47421ddec9bbbe66cd

EPSS

Процентиль: 54%
0.00317
Низкий

Связанные уязвимости

CVSS3: 7.3
ubuntu
больше 7 лет назад

procps-ng before version 3.3.15 is vulnerable to a local privilege escalation in top. If a user runs top with HOME unset in an attacker-controlled directory, the attacker could achieve privilege escalation by exploiting one of several vulnerabilities in the config_file() function.

CVSS3: 6.7
redhat
больше 7 лет назад

procps-ng before version 3.3.15 is vulnerable to a local privilege escalation in top. If a user runs top with HOME unset in an attacker-controlled directory, the attacker could achieve privilege escalation by exploiting one of several vulnerabilities in the config_file() function.

CVSS3: 7.3
nvd
больше 7 лет назад

procps-ng before version 3.3.15 is vulnerable to a local privilege escalation in top. If a user runs top with HOME unset in an attacker-controlled directory, the attacker could achieve privilege escalation by exploiting one of several vulnerabilities in the config_file() function.

CVSS3: 7
github
больше 3 лет назад

procps-ng before version 3.3.15 is vulnerable to a local privilege escalation in top. If a user runs top with HOME unset in an attacker-controlled directory, the attacker could achieve privilege escalation by exploiting one of several vulnerabilities in the config_file() function.

oracle-oval
больше 6 лет назад

ELSA-2019-2189: procps-ng security and bug fix update (MODERATE)

EPSS

Процентиль: 54%
0.00317
Низкий