Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-1124

Опубликовано: 17 мая 2018
Источник: redhat
CVSS3: 7.3
EPSS Низкий

Описание

procps-ng before version 3.3.15 is vulnerable to multiple integer overflows leading to a heap corruption in file2strvec function. This allows a privilege escalation for a local attacker who can create entries in procfs by starting processes, which could result in crashes or arbitrary code execution in proc utilities run by other users.

Multiple integer overflows leading to heap corruption flaws were discovered in file2strvec(). These vulnerabilities can lead to privilege escalation for a local attacker who can create entries in procfs by starting processes, which will lead to crashes or arbitrary code execution in proc utilities run by other users (eg pgrep, pkill, pidof, w).

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5procpsWill not fix
Red Hat Enterprise Linux 8procps-ngNot affected
Red Hat Enterprise Linux 6procpsFixedRHSA-2018:177731.05.2018
Red Hat Enterprise Linux 6.6 Advanced Update SupportprocpsFixedRHSA-2018:226826.07.2018
Red Hat Enterprise Linux 6.6 Telco Extended Update SupportprocpsFixedRHSA-2018:226826.07.2018
Red Hat Enterprise Linux 6.7 Extended Update SupportprocpsFixedRHSA-2018:226726.07.2018
Red Hat Enterprise Linux 7procps-ngFixedRHSA-2018:170023.05.2018
Red Hat Enterprise Linux 7.3 Advanced Update Supportprocps-ngFixedRHSA-2019:240107.08.2019
Red Hat Enterprise Linux 7.3 Telco Extended Update Supportprocps-ngFixedRHSA-2019:240107.08.2019
Red Hat Enterprise Linux 7.3 Update Services for SAP Solutionsprocps-ngFixedRHSA-2019:240107.08.2019

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-190->CWE-122
https://bugzilla.redhat.com/show_bug.cgi?id=1575465procps: Integer overflows leading to heap overflow in file2strvec

EPSS

Процентиль: 62%
0.00432
Низкий

7.3 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 7 лет назад

procps-ng before version 3.3.15 is vulnerable to multiple integer overflows leading to a heap corruption in file2strvec function. This allows a privilege escalation for a local attacker who can create entries in procfs by starting processes, which could result in crashes or arbitrary code execution in proc utilities run by other users.

CVSS3: 7.8
nvd
больше 7 лет назад

procps-ng before version 3.3.15 is vulnerable to multiple integer overflows leading to a heap corruption in file2strvec function. This allows a privilege escalation for a local attacker who can create entries in procfs by starting processes, which could result in crashes or arbitrary code execution in proc utilities run by other users.

CVSS3: 7.8
debian
больше 7 лет назад

procps-ng before version 3.3.15 is vulnerable to multiple integer over ...

CVSS3: 7.8
github
больше 3 лет назад

procps-ng before version 3.3.15 is vulnerable to multiple integer overflows leading to a heap corruption in file2strvec function. This allows a privilege escalation for a local attacker who can create entries in procfs by starting processes, which could result in crashes or arbitrary code execution in proc utilities run by other users.

CVSS3: 7.8
fstec
больше 7 лет назад

Уязвимость функции file2strvec набора консольных приложений для мониторинга и завершения системных процессов Props-ng, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 62%
0.00432
Низкий

7.3 High

CVSS3

Уязвимость CVE-2018-1124