2024-05-26 14:27:05 +02:00
### [CVE-2018-1124](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1124)




### Description
procps-ng before version 3.3.15 is vulnerable to multiple integer overflows leading to a heap corruption in file2strvec function. This allows a privilege escalation for a local attacker who can create entries in procfs by starting processes, which could result in crashes or arbitrary code execution in proc utilities run by other users.
### POC
#### Reference
- http://seclists.org/oss-sec/2018/q2/122
2024-06-09 00:33:16 +00:00
- http://seclists.org/oss-sec/2018/q2/122
2024-05-26 14:27:05 +02:00
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
2024-06-09 00:33:16 +00:00
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
2024-05-26 14:27:05 +02:00
- https://usn.ubuntu.com/3658-2/
2024-06-09 00:33:16 +00:00
- https://usn.ubuntu.com/3658-2/
2024-05-26 14:27:05 +02:00
- https://www.exploit-db.com/exploits/44806/
2024-06-09 00:33:16 +00:00
- https://www.exploit-db.com/exploits/44806/
2024-05-26 14:27:05 +02:00
- https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
2024-06-09 00:33:16 +00:00
- https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
2024-05-26 14:27:05 +02:00
#### Github
- https://github.com/ARPSyndicate/cvemon