mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-29 01:31:01 +00:00
28 lines
1.4 KiB
Markdown
28 lines
1.4 KiB
Markdown
### [CVE-2018-1124](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1124)
|
|

|
|

|
|

|
|

|
|
|
|
### Description
|
|
|
|
procps-ng before version 3.3.15 is vulnerable to multiple integer overflows leading to a heap corruption in file2strvec function. This allows a privilege escalation for a local attacker who can create entries in procfs by starting processes, which could result in crashes or arbitrary code execution in proc utilities run by other users.
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
- http://seclists.org/oss-sec/2018/q2/122
|
|
- http://seclists.org/oss-sec/2018/q2/122
|
|
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
|
|
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
|
|
- https://usn.ubuntu.com/3658-2/
|
|
- https://usn.ubuntu.com/3658-2/
|
|
- https://www.exploit-db.com/exploits/44806/
|
|
- https://www.exploit-db.com/exploits/44806/
|
|
- https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
|
|
- https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
|
|
|
|
#### Github
|
|
- https://github.com/ARPSyndicate/cvemon
|
|
|