### [CVE-2018-1124](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1124) ![](https://img.shields.io/static/v1?label=Product&message=procps-ng&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-122&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-190&color=brighgreen) ### Description procps-ng before version 3.3.15 is vulnerable to multiple integer overflows leading to a heap corruption in file2strvec function. This allows a privilege escalation for a local attacker who can create entries in procfs by starting processes, which could result in crashes or arbitrary code execution in proc utilities run by other users. ### POC #### Reference - http://seclists.org/oss-sec/2018/q2/122 - http://seclists.org/oss-sec/2018/q2/122 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 - https://usn.ubuntu.com/3658-2/ - https://usn.ubuntu.com/3658-2/ - https://www.exploit-db.com/exploits/44806/ - https://www.exploit-db.com/exploits/44806/ - https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt - https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt #### Github - https://github.com/ARPSyndicate/cvemon