procps-ng before version 3.3.15 is vulnerable to multiple integer overflows leading to a heap corruption in file2strvec function. This allows a privilege escalation for a local attacker who can create entries in procfs by starting processes, which could result in crashes or arbitrary code execution in proc utilities run by other users.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-1390-1 procps security update
Debian DSA Debian DSA DSA-4208-1 procps security update
EUVD EUVD EUVD-2018-11768 procps-ng before version 3.3.15 is vulnerable to multiple integer overflows leading to a heap corruption in file2strvec function. This allows a privilege escalation for a local attacker who can create entries in procfs by starting processes, which could result in crashes or arbitrary code execution in proc utilities run by other users.
Ubuntu USN Ubuntu USN USN-3658-1 procps-ng vulnerabilities
Ubuntu USN Ubuntu USN USN-3658-2 procps-ng vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-05T03:51:48.632Z

Reserved: 2017-12-04T00:00:00

Link: CVE-2018-1124

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-05-23T13:29:00.263

Modified: 2024-11-21T03:59:13.937

Link: CVE-2018-1124

cve-icon Redhat

Severity : Important

Publid Date: 2018-05-17T17:00:00Z

Links: CVE-2018-1124 - Bugzilla

cve-icon OpenCVE Enrichment

No data.