Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-1122

Опубликовано: 17 мая 2018
Источник: redhat
CVSS3: 6.7
EPSS Низкий

Описание

procps-ng before version 3.3.15 is vulnerable to a local privilege escalation in top. If a user runs top with HOME unset in an attacker-controlled directory, the attacker could achieve privilege escalation by exploiting one of several vulnerabilities in the config_file() function.

If the HOME environment variable is unset or empty, top will read its configuration file from the current working directory without any security check. If a user runs top with HOME unset in an attacker-controlled directory, the attacker could achieve privilege escalation by exploiting one of several vulnerabilities in the config_file() function.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5procpsWill not fix
Red Hat Enterprise Linux 6procpsWill not fix
Red Hat Enterprise Linux 8procps-ngNot affected
Red Hat Ansible Tower 3.4 for RHEL 7ansible-tower-34/ansible-tower-memcachedFixedRHBA-2020:054718.02.2020
Red Hat Ansible Tower 3.4 for RHEL 7ansible-tower-35/ansible-tower-memcachedFixedRHBA-2020:054718.02.2020
Red Hat Ansible Tower 3.4 for RHEL 7ansible-tower-37/ansible-tower-memcached-rhel7FixedRHBA-2020:054718.02.2020
Red Hat Enterprise Linux 7procps-ngFixedRHSA-2019:218906.08.2019
Red Hat Enterprise Linux 7.4 Advanced Update Supportprocps-ngFixedRHSA-2020:059525.02.2020
Red Hat Enterprise Linux 7.4 Telco Extended Update Supportprocps-ngFixedRHSA-2020:059525.02.2020
Red Hat Enterprise Linux 7.4 Update Services for SAP Solutionsprocps-ngFixedRHSA-2020:059525.02.2020

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-829
https://bugzilla.redhat.com/show_bug.cgi?id=1575466procps: Local privilege escalation in top

EPSS

Процентиль: 54%
0.00317
Низкий

6.7 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.3
ubuntu
больше 7 лет назад

procps-ng before version 3.3.15 is vulnerable to a local privilege escalation in top. If a user runs top with HOME unset in an attacker-controlled directory, the attacker could achieve privilege escalation by exploiting one of several vulnerabilities in the config_file() function.

CVSS3: 7.3
nvd
больше 7 лет назад

procps-ng before version 3.3.15 is vulnerable to a local privilege escalation in top. If a user runs top with HOME unset in an attacker-controlled directory, the attacker could achieve privilege escalation by exploiting one of several vulnerabilities in the config_file() function.

CVSS3: 7.3
debian
больше 7 лет назад

procps-ng before version 3.3.15 is vulnerable to a local privilege esc ...

CVSS3: 7
github
больше 3 лет назад

procps-ng before version 3.3.15 is vulnerable to a local privilege escalation in top. If a user runs top with HOME unset in an attacker-controlled directory, the attacker could achieve privilege escalation by exploiting one of several vulnerabilities in the config_file() function.

oracle-oval
больше 6 лет назад

ELSA-2019-2189: procps-ng security and bug fix update (MODERATE)

EPSS

Процентиль: 54%
0.00317
Низкий

6.7 Medium

CVSS3