{ "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2018-1124", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "procps-ng", "version": { "version_data": [ { "version_value": "procps-ng 3.3.15" } ] } } ] }, "vendor_name": "[UNKNOWN]" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "procps-ng before version 3.3.15 is vulnerable to multiple integer overflows leading to a heap corruption in file2strvec function. This allows a privilege escalation for a local attacker who can create entries in procfs by starting processes, which could result in crashes or arbitrary code execution in proc utilities run by other users." } ] }, "impact": { "cvss": [ [ { "vectorString": "7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ] ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-190" } ] }, { "description": [ { "lang": "eng", "value": "CWE-122" } ] } ] }, "references": { "reference_data": [ { "name": "USN-3658-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3658-1/" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1124", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1124" }, { "name": "DSA-4208", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4208" }, { "name": "GLSA-201805-14", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201805-14" }, { "name": "44806", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/44806/" }, { "name": "RHSA-2018:1777", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1777" }, { "name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10241", "refsource": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10241" }, { "name": "[debian-lts-announce] 20180531 [SECURITY] [DLA 1390-1] procps security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html" }, { "name": "RHSA-2018:2267", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2267" }, { "name": "RHSA-2018:2268", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2268" }, { "name": "RHSA-2018:1700", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1700" }, { "name": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0", "refsource": "CONFIRM", "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "name": "104214", "refsource": "BID", "url": "http://www.securityfocus.com/bid/104214" }, { "name": "[oss-security] 20180517 Qualys Security Advisory - Procps-ng Audit Report", "refsource": "MLIST", "url": "http://seclists.org/oss-sec/2018/q2/122" }, { "name": "1041057", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1041057" }, { "name": "RHSA-2018:1820", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1820" }, { "name": "USN-3658-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3658-2/" }, { "name": "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt", "refsource": "MISC", "url": "https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt" } ] } }