Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2018-1125

Опубликовано: 23 мая 2018
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 5
CVSS3: 7.5

Описание

procps-ng before version 3.3.15 is vulnerable to a stack buffer overflow in pgrep. This vulnerability is mitigated by FORTIFY, as it involves strncat() to a stack-allocated string. When pgrep is compiled with FORTIFY (as on Red Hat Enterprise Linux and Fedora), the impact is limited to a crash.

РелизСтатусПримечание
artful

released

2:3.3.12-1ubuntu2.1
bionic

released

2:3.3.12-3ubuntu1.1
devel

released

2:3.3.15-2ubuntu1
esm-infra-legacy/trusty

released

1:3.3.9-1ubuntu2.3
esm-infra/bionic

released

2:3.3.12-3ubuntu1.1
esm-infra/xenial

released

2:3.3.10-4ubuntu2.4
precise/esm

not-affected

1:3.2.8-11ubuntu6.6
trusty

released

1:3.3.9-1ubuntu2.3
trusty/esm

released

1:3.3.9-1ubuntu2.3
upstream

released

3.3.15

Показывать по

EPSS

Процентиль: 58%
0.00364
Низкий

5 Medium

CVSS2

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 4.4
redhat
больше 7 лет назад

procps-ng before version 3.3.15 is vulnerable to a stack buffer overflow in pgrep. This vulnerability is mitigated by FORTIFY, as it involves strncat() to a stack-allocated string. When pgrep is compiled with FORTIFY (as on Red Hat Enterprise Linux and Fedora), the impact is limited to a crash.

CVSS3: 7.5
nvd
больше 7 лет назад

procps-ng before version 3.3.15 is vulnerable to a stack buffer overflow in pgrep. This vulnerability is mitigated by FORTIFY, as it involves strncat() to a stack-allocated string. When pgrep is compiled with FORTIFY (as on Red Hat Enterprise Linux and Fedora), the impact is limited to a crash.

CVSS3: 7.5
debian
больше 7 лет назад

procps-ng before version 3.3.15 is vulnerable to a stack buffer overfl ...

CVSS3: 7.5
github
больше 3 лет назад

procps-ng before version 3.3.15 is vulnerable to a stack buffer overflow in pgrep. This vulnerability is mitigated by FORTIFY, as it involves strncat() to a stack-allocated string. When pgrep is compiled with FORTIFY (as on Red Hat Enterprise Linux and Fedora), the impact is limited to a crash.

CVSS3: 7.5
fstec
больше 7 лет назад

Уязвимость функции pgrep набора консольных приложений для мониторинга и завершения системных процессов Props-ng, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 58%
0.00364
Низкий

5 Medium

CVSS2

7.5 High

CVSS3