CVE-2018-1124

Name
CVE-2018-1124
Description
procps-ng before version 3.3.15 is vulnerable to multiple integer overflows leading to a heap corruption in file2strvec function. This allows a privilege escalation for a local attacker who can create entries in procfs by starting processes, which could result in crashes or arbitrary code execution in proc utilities run by other users.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Exploit https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
Issue Tracking https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1124
Mailing List http://seclists.org/oss-sec/2018/q2/122
Third Party Advisory https://www.debian.org/security/2018/dsa-4208
Third Party Advisory https://usn.ubuntu.com/3658-1/
Third Party Advisory https://access.redhat.com/errata/RHSA-2018:1700
Third Party Advisory http://www.securityfocus.com/bid/104214
Third Party Advisory https://www.exploit-db.com/exploits/44806/
Third Party Advisory https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html
Third Party Advisory https://access.redhat.com/errata/RHSA-2018:1777
Third Party Advisory https://usn.ubuntu.com/3658-2/
Third Party Advisory https://access.redhat.com/errata/RHSA-2018:1820
Third Party Advisory https://kc.mcafee.com/corporate/index?page=content&id=SB10241
Third Party Advisory http://www.securitytracker.com/id/1041057
Third Party Advisory https://access.redhat.com/errata/RHSA-2018:2268
Third Party Advisory https://access.redhat.com/errata/RHSA-2018:2267
Third Party Advisory https://security.gentoo.org/glsa/201805-14
Third Party Advisory https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
Third Party Advisory https://access.redhat.com/errata/RHSA-2019:1944
Third Party Advisory https://access.redhat.com/errata/RHSA-2019:2401
Mailing List http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html
Mailing List http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:procps-ng_project:procps-ng:*:*:*:*:*:*:*:* procps-ng >= None < 3.3.15

Vulnerable and fixed packages

Source package Branch Version Maintainer Status