Описание
Under some circumstances, this weakness allows a user who has access to run the “ps” utility on a machine, the ability to write almost unlimited amounts of unfiltered data into the process heap.
A heap-based buffer overflow vulnerability was found in the procps project when handling untrusted input with the -C option. This issue may allow a user with "ps" utility access to write unfiltered data into the process heap, triggering an out-of-bounds write, consuming memory and causing a crash, resulting in a denial of service.
Отчет
The affected package is procps, the command line utility known as “ps” used to understand the current state of any running processes. On 32 bit systems it is possible to use specific parameters with the -C option to trigger more memory allocation than should be allowed. As this outcome is restricted to local authenticated users, a malicious user in this situation has far more powerful tools at their disposal to bring down the server, for example by simply turning it off. For this reason Red Hat Product Security rates the impact as Low.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 6 | procps | Out of support scope | ||
Red Hat Enterprise Linux 7 | procps-ng | Out of support scope | ||
Red Hat OpenShift Container Platform 4 | procps-ng | Not affected | ||
Red Hat Enterprise Linux 8 | procps-ng | Fixed | RHSA-2023:7187 | 14.11.2023 |
Red Hat Enterprise Linux 9 | procps-ng | Fixed | RHSA-2023:6705 | 07.11.2023 |
Показывать по
Ссылки на источники
Дополнительная информация
Статус:
EPSS
3.3 Low
CVSS3
Связанные уязвимости
Under some circumstances, this weakness allows a user who has access to run the “ps” utility on a machine, the ability to write almost unlimited amounts of unfiltered data into the process heap.
Under some circumstances, this weakness allows a user who has access to run the “ps” utility on a machine, the ability to write almost unlimited amounts of unfiltered data into the process heap.
Under some circumstances, this weakness allows a user who has access t ...
EPSS
3.3 Low
CVSS3