cve/2018/CVE-2018-1124.md
2024-06-09 00:33:16 +00:00

28 lines
1.4 KiB
Markdown

### [CVE-2018-1124](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1124)
![](https://img.shields.io/static/v1?label=Product&message=procps-ng&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-122&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-190&color=brighgreen)
### Description
procps-ng before version 3.3.15 is vulnerable to multiple integer overflows leading to a heap corruption in file2strvec function. This allows a privilege escalation for a local attacker who can create entries in procfs by starting processes, which could result in crashes or arbitrary code execution in proc utilities run by other users.
### POC
#### Reference
- http://seclists.org/oss-sec/2018/q2/122
- http://seclists.org/oss-sec/2018/q2/122
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://usn.ubuntu.com/3658-2/
- https://usn.ubuntu.com/3658-2/
- https://www.exploit-db.com/exploits/44806/
- https://www.exploit-db.com/exploits/44806/
- https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
- https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
#### Github
- https://github.com/ARPSyndicate/cvemon