Vulnerabilites related to [UNKNOWN] - procps-ng, procps
CVE-2018-1122 (GCVE-0-2018-1122)
Vulnerability from cvelistv5
Published
2018-05-23 14:00
Modified
2024-08-05 03:51
Severity ?
EPSS score ?
Summary
procps-ng before version 3.3.15 is vulnerable to a local privilege escalation in top. If a user runs top with HOME unset in an attacker-controlled directory, the attacker could achieve privilege escalation by exploiting one of several vulnerabilities in the config_file() function.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
[UNKNOWN] | procps-ng, procps |
Version: procps-ng 3.3.15 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T03:51:48.790Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "USN-3658-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3658-1/", }, { name: "DSA-4208", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2018/dsa-4208", }, { name: "GLSA-201805-14", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201805-14", }, { name: "44806", tags: [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred", ], url: "https://www.exploit-db.com/exploits/44806/", }, { name: "[debian-lts-announce] 20180531 [SECURITY] [DLA 1390-1] procps security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html", }, { name: "USN-3658-3", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3658-3/", }, { name: "104214", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/104214", }, { name: "[oss-security] 20180517 Qualys Security Advisory - Procps-ng Audit Report", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://seclists.org/oss-sec/2018/q2/122", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1122", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", }, { name: "RHSA-2019:2189", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2019:2189", }, { name: "openSUSE-SU-2019:2376", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html", }, { name: "openSUSE-SU-2019:2379", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html", }, { name: "RHSA-2020:0595", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2020:0595", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "procps-ng, procps", vendor: "[UNKNOWN]", versions: [ { status: "affected", version: "procps-ng 3.3.15", }, ], }, ], datePublic: "2018-05-17T00:00:00", descriptions: [ { lang: "en", value: "procps-ng before version 3.3.15 is vulnerable to a local privilege escalation in top. If a user runs top with HOME unset in an attacker-controlled directory, the attacker could achieve privilege escalation by exploiting one of several vulnerabilities in the config_file() function.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-829", description: "CWE-829", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2020-02-25T14:06:10", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "USN-3658-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3658-1/", }, { name: "DSA-4208", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2018/dsa-4208", }, { name: "GLSA-201805-14", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201805-14", }, { name: "44806", tags: [ "exploit", "x_refsource_EXPLOIT-DB", ], url: "https://www.exploit-db.com/exploits/44806/", }, { name: "[debian-lts-announce] 20180531 [SECURITY] [DLA 1390-1] procps security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html", }, { name: "USN-3658-3", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3658-3/", }, { name: "104214", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/104214", }, { name: "[oss-security] 20180517 Qualys Security Advisory - Procps-ng Audit Report", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://seclists.org/oss-sec/2018/q2/122", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1122", }, { tags: [ "x_refsource_MISC", ], url: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", }, { name: "RHSA-2019:2189", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2019:2189", }, { name: "openSUSE-SU-2019:2376", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html", }, { name: "openSUSE-SU-2019:2379", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html", }, { name: "RHSA-2020:0595", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2020:0595", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2018-1122", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "procps-ng, procps", version: { version_data: [ { version_value: "procps-ng 3.3.15", }, ], }, }, ], }, vendor_name: "[UNKNOWN]", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "procps-ng before version 3.3.15 is vulnerable to a local privilege escalation in top. If a user runs top with HOME unset in an attacker-controlled directory, the attacker could achieve privilege escalation by exploiting one of several vulnerabilities in the config_file() function.", }, ], }, impact: { cvss: [ [ { vectorString: "7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, ], ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-829", }, ], }, ], }, references: { reference_data: [ { name: "USN-3658-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3658-1/", }, { name: "DSA-4208", refsource: "DEBIAN", url: "https://www.debian.org/security/2018/dsa-4208", }, { name: "GLSA-201805-14", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201805-14", }, { name: "44806", refsource: "EXPLOIT-DB", url: "https://www.exploit-db.com/exploits/44806/", }, { name: "[debian-lts-announce] 20180531 [SECURITY] [DLA 1390-1] procps security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html", }, { name: "USN-3658-3", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3658-3/", }, { name: "104214", refsource: "BID", url: "http://www.securityfocus.com/bid/104214", }, { name: "[oss-security] 20180517 Qualys Security Advisory - Procps-ng Audit Report", refsource: "MLIST", url: "http://seclists.org/oss-sec/2018/q2/122", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1122", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1122", }, { name: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", refsource: "MISC", url: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", }, { name: "RHSA-2019:2189", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2019:2189", }, { name: "openSUSE-SU-2019:2376", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html", }, { name: "openSUSE-SU-2019:2379", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html", }, { name: "RHSA-2020:0595", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2020:0595", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2018-1122", datePublished: "2018-05-23T14:00:00", dateReserved: "2017-12-04T00:00:00", dateUpdated: "2024-08-05T03:51:48.790Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2018-1126 (GCVE-0-2018-1126)
Vulnerability from cvelistv5
Published
2018-05-23 13:00
Modified
2024-08-05 03:51
Severity ?
EPSS score ?
Summary
procps-ng before version 3.3.15 is vulnerable to an incorrect integer size in proc/alloc.* leading to truncation/integer overflow issues. This flaw is related to CVE-2018-1124.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
[UNKNOWN] | procps-ng, procps |
Version: procps-ng 3.3.15 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T03:51:48.860Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "USN-3658-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3658-1/", }, { name: "DSA-4208", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2018/dsa-4208", }, { name: "RHSA-2018:1777", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:1777", }, { name: "[debian-lts-announce] 20180531 [SECURITY] [DLA 1390-1] procps security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html", }, { name: "RHSA-2018:2267", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:2267", }, { name: "RHSA-2018:2268", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:2268", }, { name: "RHSA-2018:1700", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:1700", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0", }, { name: "104214", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/104214", }, { name: "[oss-security] 20180517 Qualys Security Advisory - Procps-ng Audit Report", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://seclists.org/oss-sec/2018/q2/122", }, { name: "1041057", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1041057", }, { name: "RHSA-2018:1820", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:1820", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1126", }, { name: "USN-3658-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3658-2/", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", }, { name: "RHSA-2019:1944", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2019:1944", }, { name: "openSUSE-SU-2019:2376", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html", }, { name: "openSUSE-SU-2019:2379", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "procps-ng, procps", vendor: "[UNKNOWN]", versions: [ { status: "affected", version: "procps-ng 3.3.15", }, ], }, ], datePublic: "2018-05-17T00:00:00", descriptions: [ { lang: "en", value: "procps-ng before version 3.3.15 is vulnerable to an incorrect integer size in proc/alloc.* leading to truncation/integer overflow issues. This flaw is related to CVE-2018-1124.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-190", description: "CWE-190", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2019-10-26T23:06:06", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "USN-3658-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3658-1/", }, { name: "DSA-4208", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2018/dsa-4208", }, { name: "RHSA-2018:1777", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:1777", }, { name: "[debian-lts-announce] 20180531 [SECURITY] [DLA 1390-1] procps security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html", }, { name: "RHSA-2018:2267", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:2267", }, { name: "RHSA-2018:2268", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:2268", }, { name: "RHSA-2018:1700", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:1700", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0", }, { name: "104214", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/104214", }, { name: "[oss-security] 20180517 Qualys Security Advisory - Procps-ng Audit Report", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://seclists.org/oss-sec/2018/q2/122", }, { name: "1041057", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1041057", }, { name: "RHSA-2018:1820", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:1820", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1126", }, { name: "USN-3658-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3658-2/", }, { tags: [ "x_refsource_MISC", ], url: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", }, { name: "RHSA-2019:1944", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2019:1944", }, { name: "openSUSE-SU-2019:2376", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html", }, { name: "openSUSE-SU-2019:2379", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2018-1126", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "procps-ng, procps", version: { version_data: [ { version_value: "procps-ng 3.3.15", }, ], }, }, ], }, vendor_name: "[UNKNOWN]", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "procps-ng before version 3.3.15 is vulnerable to an incorrect integer size in proc/alloc.* leading to truncation/integer overflow issues. This flaw is related to CVE-2018-1124.", }, ], }, impact: { cvss: [ [ { vectorString: "4.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, ], ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-190", }, ], }, ], }, references: { reference_data: [ { name: "USN-3658-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3658-1/", }, { name: "DSA-4208", refsource: "DEBIAN", url: "https://www.debian.org/security/2018/dsa-4208", }, { name: "RHSA-2018:1777", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:1777", }, { name: "[debian-lts-announce] 20180531 [SECURITY] [DLA 1390-1] procps security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html", }, { name: "RHSA-2018:2267", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:2267", }, { name: "RHSA-2018:2268", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:2268", }, { name: "RHSA-2018:1700", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:1700", }, { name: "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0", refsource: "CONFIRM", url: "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0", }, { name: "104214", refsource: "BID", url: "http://www.securityfocus.com/bid/104214", }, { name: "[oss-security] 20180517 Qualys Security Advisory - Procps-ng Audit Report", refsource: "MLIST", url: "http://seclists.org/oss-sec/2018/q2/122", }, { name: "1041057", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1041057", }, { name: "RHSA-2018:1820", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:1820", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1126", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1126", }, { name: "USN-3658-2", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3658-2/", }, { name: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", refsource: "MISC", url: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", }, { name: "RHSA-2019:1944", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2019:1944", }, { name: "openSUSE-SU-2019:2376", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html", }, { name: "openSUSE-SU-2019:2379", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2018-1126", datePublished: "2018-05-23T13:00:00", dateReserved: "2017-12-04T00:00:00", dateUpdated: "2024-08-05T03:51:48.860Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2018-1121 (GCVE-0-2018-1121)
Vulnerability from cvelistv5
Published
2018-06-13 20:00
Modified
2024-08-05 03:51
Severity ?
EPSS score ?
Summary
procps-ng, procps is vulnerable to a process hiding through race condition. Since the kernel's proc_pid_readdir() returns PID entries in ascending numeric order, a process occupying a high PID can use inotify events to determine when the process list is being scanned, and fork/exec to obtain a lower PID, thus avoiding enumeration. An unprivileged attacker can hide a process from procps-ng's utilities by exploiting a race condition in reading /proc/PID entries. This vulnerability affects procps and procps-ng up to version 3.3.15, newer versions might be affected also.
References
▼ | URL | Tags |
---|---|---|
https://www.exploit-db.com/exploits/44806/ | exploit, x_refsource_EXPLOIT-DB | |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1121 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/104214 | vdb-entry, x_refsource_BID | |
http://seclists.org/oss-sec/2018/q2/122 | mailing-list, x_refsource_MLIST | |
https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
[UNKNOWN] | procps-ng, procps |
Version: up to procps-ng 3.3.15 and newer |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T03:51:48.742Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "44806", tags: [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred", ], url: "https://www.exploit-db.com/exploits/44806/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1121", }, { name: "104214", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/104214", }, { name: "[oss-security] 20180517 Qualys Security Advisory - Procps-ng Audit Report", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://seclists.org/oss-sec/2018/q2/122", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "procps-ng, procps", vendor: "[UNKNOWN]", versions: [ { status: "affected", version: "up to procps-ng 3.3.15 and newer", }, ], }, ], datePublic: "2018-05-17T00:00:00", descriptions: [ { lang: "en", value: "procps-ng, procps is vulnerable to a process hiding through race condition. Since the kernel's proc_pid_readdir() returns PID entries in ascending numeric order, a process occupying a high PID can use inotify events to determine when the process list is being scanned, and fork/exec to obtain a lower PID, thus avoiding enumeration. An unprivileged attacker can hide a process from procps-ng's utilities by exploiting a race condition in reading /proc/PID entries. This vulnerability affects procps and procps-ng up to version 3.3.15, newer versions might be affected also.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 3.9, baseSeverity: "LOW", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-367", description: "CWE-367", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2020-06-30T15:26:18", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "44806", tags: [ "exploit", "x_refsource_EXPLOIT-DB", ], url: "https://www.exploit-db.com/exploits/44806/", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1121", }, { name: "104214", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/104214", }, { name: "[oss-security] 20180517 Qualys Security Advisory - Procps-ng Audit Report", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://seclists.org/oss-sec/2018/q2/122", }, { tags: [ "x_refsource_MISC", ], url: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", }, ], }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2018-1121", datePublished: "2018-06-13T20:00:00", dateReserved: "2017-12-04T00:00:00", dateUpdated: "2024-08-05T03:51:48.742Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2018-1123 (GCVE-0-2018-1123)
Vulnerability from cvelistv5
Published
2018-05-23 14:00
Modified
2024-08-05 03:51
Severity ?
EPSS score ?
Summary
procps-ng before version 3.3.15 is vulnerable to a denial of service in ps via mmap buffer overflow. Inbuilt protection in ps maps a guard page at the end of the overflowed buffer, ensuring that the impact of this flaw is limited to a crash (temporary denial of service).
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
[UNKNOWN] | procps-ng, procps |
Version: procps-ng 3.3.15 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T03:51:48.635Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "USN-3658-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3658-1/", }, { name: "DSA-4208", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2018/dsa-4208", }, { name: "GLSA-201805-14", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201805-14", }, { name: "44806", tags: [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred", ], url: "https://www.exploit-db.com/exploits/44806/", }, { name: "[debian-lts-announce] 20180531 [SECURITY] [DLA 1390-1] procps security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html", }, { name: "USN-3658-3", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3658-3/", }, { name: "104214", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/104214", }, { name: "[oss-security] 20180517 Qualys Security Advisory - Procps-ng Audit Report", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://seclists.org/oss-sec/2018/q2/122", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1123", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", }, { name: "openSUSE-SU-2019:2376", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html", }, { name: "openSUSE-SU-2019:2379", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html", }, { name: "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E", }, { name: "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "procps-ng, procps", vendor: "[UNKNOWN]", versions: [ { status: "affected", version: "procps-ng 3.3.15", }, ], }, ], datePublic: "2018-05-17T00:00:00", descriptions: [ { lang: "en", value: "procps-ng before version 3.3.15 is vulnerable to a denial of service in ps via mmap buffer overflow. Inbuilt protection in ps maps a guard page at the end of the overflowed buffer, ensuring that the impact of this flaw is limited to a crash (temporary denial of service).", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 3.9, baseSeverity: "LOW", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-122", description: "CWE-122", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2021-06-29T14:07:52", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "USN-3658-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3658-1/", }, { name: "DSA-4208", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2018/dsa-4208", }, { name: "GLSA-201805-14", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201805-14", }, { name: "44806", tags: [ "exploit", "x_refsource_EXPLOIT-DB", ], url: "https://www.exploit-db.com/exploits/44806/", }, { name: "[debian-lts-announce] 20180531 [SECURITY] [DLA 1390-1] procps security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html", }, { name: "USN-3658-3", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3658-3/", }, { name: "104214", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/104214", }, { name: "[oss-security] 20180517 Qualys Security Advisory - Procps-ng Audit Report", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://seclists.org/oss-sec/2018/q2/122", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1123", }, { tags: [ "x_refsource_MISC", ], url: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", }, { name: "openSUSE-SU-2019:2376", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html", }, { name: "openSUSE-SU-2019:2379", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html", }, { name: "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E", }, { name: "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2018-1123", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "procps-ng, procps", version: { version_data: [ { version_value: "procps-ng 3.3.15", }, ], }, }, ], }, vendor_name: "[UNKNOWN]", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "procps-ng before version 3.3.15 is vulnerable to a denial of service in ps via mmap buffer overflow. Inbuilt protection in ps maps a guard page at the end of the overflowed buffer, ensuring that the impact of this flaw is limited to a crash (temporary denial of service).", }, ], }, impact: { cvss: [ [ { vectorString: "3.9/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L", version: "3.0", }, ], ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-122", }, ], }, ], }, references: { reference_data: [ { name: "USN-3658-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3658-1/", }, { name: "DSA-4208", refsource: "DEBIAN", url: "https://www.debian.org/security/2018/dsa-4208", }, { name: "GLSA-201805-14", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201805-14", }, { name: "44806", refsource: "EXPLOIT-DB", url: "https://www.exploit-db.com/exploits/44806/", }, { name: "[debian-lts-announce] 20180531 [SECURITY] [DLA 1390-1] procps security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html", }, { name: "USN-3658-3", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3658-3/", }, { name: "104214", refsource: "BID", url: "http://www.securityfocus.com/bid/104214", }, { name: "[oss-security] 20180517 Qualys Security Advisory - Procps-ng Audit Report", refsource: "MLIST", url: "http://seclists.org/oss-sec/2018/q2/122", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1123", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1123", }, { name: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", refsource: "MISC", url: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", }, { name: "openSUSE-SU-2019:2376", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html", }, { name: "openSUSE-SU-2019:2379", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html", }, { name: "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", refsource: "MLIST", url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E", }, { name: "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", refsource: "MLIST", url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2018-1123", datePublished: "2018-05-23T14:00:00", dateReserved: "2017-12-04T00:00:00", dateUpdated: "2024-08-05T03:51:48.635Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2018-1125 (GCVE-0-2018-1125)
Vulnerability from cvelistv5
Published
2018-05-23 14:00
Modified
2024-08-05 03:51
Severity ?
EPSS score ?
Summary
procps-ng before version 3.3.15 is vulnerable to a stack buffer overflow in pgrep. This vulnerability is mitigated by FORTIFY, as it involves strncat() to a stack-allocated string. When pgrep is compiled with FORTIFY (as on Red Hat Enterprise Linux and Fedora), the impact is limited to a crash.
References
▼ | URL | Tags |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1125 | x_refsource_CONFIRM | |
https://usn.ubuntu.com/3658-1/ | vendor-advisory, x_refsource_UBUNTU | |
https://www.debian.org/security/2018/dsa-4208 | vendor-advisory, x_refsource_DEBIAN | |
https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html | mailing-list, x_refsource_MLIST | |
https://usn.ubuntu.com/3658-3/ | vendor-advisory, x_refsource_UBUNTU | |
http://www.securityfocus.com/bid/104214 | vdb-entry, x_refsource_BID | |
http://seclists.org/oss-sec/2018/q2/122 | mailing-list, x_refsource_MLIST | |
https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt | x_refsource_MISC | |
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html | vendor-advisory, x_refsource_SUSE | |
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html | vendor-advisory, x_refsource_SUSE |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
[UNKNOWN] | procps-ng, procps |
Version: procps-ng 3.3.15 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T03:51:48.542Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1125", }, { name: "USN-3658-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3658-1/", }, { name: "DSA-4208", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2018/dsa-4208", }, { name: "[debian-lts-announce] 20180531 [SECURITY] [DLA 1390-1] procps security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html", }, { name: "USN-3658-3", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3658-3/", }, { name: "104214", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/104214", }, { name: "[oss-security] 20180517 Qualys Security Advisory - Procps-ng Audit Report", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://seclists.org/oss-sec/2018/q2/122", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", }, { name: "openSUSE-SU-2019:2376", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html", }, { name: "openSUSE-SU-2019:2379", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "procps-ng, procps", vendor: "[UNKNOWN]", versions: [ { status: "affected", version: "procps-ng 3.3.15", }, ], }, ], datePublic: "2018-05-17T00:00:00", descriptions: [ { lang: "en", value: "procps-ng before version 3.3.15 is vulnerable to a stack buffer overflow in pgrep. This vulnerability is mitigated by FORTIFY, as it involves strncat() to a stack-allocated string. When pgrep is compiled with FORTIFY (as on Red Hat Enterprise Linux and Fedora), the impact is limited to a crash.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 4.4, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-121", description: "CWE-121", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2019-10-26T23:06:07", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1125", }, { name: "USN-3658-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3658-1/", }, { name: "DSA-4208", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2018/dsa-4208", }, { name: "[debian-lts-announce] 20180531 [SECURITY] [DLA 1390-1] procps security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html", }, { name: "USN-3658-3", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3658-3/", }, { name: "104214", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/104214", }, { name: "[oss-security] 20180517 Qualys Security Advisory - Procps-ng Audit Report", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://seclists.org/oss-sec/2018/q2/122", }, { tags: [ "x_refsource_MISC", ], url: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", }, { name: "openSUSE-SU-2019:2376", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html", }, { name: "openSUSE-SU-2019:2379", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2018-1125", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "procps-ng, procps", version: { version_data: [ { version_value: "procps-ng 3.3.15", }, ], }, }, ], }, vendor_name: "[UNKNOWN]", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "procps-ng before version 3.3.15 is vulnerable to a stack buffer overflow in pgrep. This vulnerability is mitigated by FORTIFY, as it involves strncat() to a stack-allocated string. When pgrep is compiled with FORTIFY (as on Red Hat Enterprise Linux and Fedora), the impact is limited to a crash.", }, ], }, impact: { cvss: [ [ { vectorString: "4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", version: "3.0", }, ], ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-121", }, ], }, ], }, references: { reference_data: [ { name: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1125", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1125", }, { name: "USN-3658-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3658-1/", }, { name: "DSA-4208", refsource: "DEBIAN", url: "https://www.debian.org/security/2018/dsa-4208", }, { name: "[debian-lts-announce] 20180531 [SECURITY] [DLA 1390-1] procps security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html", }, { name: "USN-3658-3", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3658-3/", }, { name: "104214", refsource: "BID", url: "http://www.securityfocus.com/bid/104214", }, { name: "[oss-security] 20180517 Qualys Security Advisory - Procps-ng Audit Report", refsource: "MLIST", url: "http://seclists.org/oss-sec/2018/q2/122", }, { name: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", refsource: "MISC", url: "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", }, { name: "openSUSE-SU-2019:2376", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html", }, { name: "openSUSE-SU-2019:2379", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2018-1125", datePublished: "2018-05-23T14:00:00", dateReserved: "2017-12-04T00:00:00", dateUpdated: "2024-08-05T03:51:48.542Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }