CVE-2018-1122
Procps-ng - Multiple Vulnerabilities
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
3Exploited in Wild
-Decision
Descriptions
procps-ng before version 3.3.15 is vulnerable to a local privilege escalation in top. If a user runs top with HOME unset in an attacker-controlled directory, the attacker could achieve privilege escalation by exploiting one of several vulnerabilities in the config_file() function.
procps-ng en versiones anteriores a la 3.3.15 es vulnerable a un escalado de privilegios locales en top. Si un usuario ejecuta top sin establecer HOME en un directorio controlado por el atacante, este podría lograr el escalado de privilegios explotando una de las varias vulnerabilidades existentes en la función config_file().
If the HOME environment variable is unset or empty, top will read its configuration file from the current working directory without any security check. If a user runs top with HOME unset in an attacker-controlled directory, the attacker could achieve privilege escalation by exploiting one of several vulnerabilities in the config_file() function.
It was discovered that the procps-ng top utility incorrectly read its configuration file from the current working directory. A local attacker could possibly use this issue to escalate privileges. It was discovered that the procps-ng ps tool incorrectly handled memory. A local user could possibly use this issue to cause a denial of service. It was discovered that libprocps incorrectly handled the file2strvec function. A local attacker could possibly use this to execute arbitrary code. Various other issues were also addressed.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-12-04 CVE Reserved
- 2018-05-22 CVE Published
- 2018-05-22 First Exploit
- 2024-08-05 CVE Updated
- 2025-04-29 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-829: Inclusion of Functionality from Untrusted Control Sphere
CAPEC
References (17)
URL | Tag | Source |
---|---|---|
http://seclists.org/oss-sec/2018/q2/122 | Mailing List |
|
http://www.securityfocus.com/bid/104214 | Third Party Advisory | |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1122 | Issue Tracking | |
https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html | Mailing List |
|
URL | Date | SRC |
---|---|---|
https://packetstorm.news/files/id/147806 | 2018-05-22 | |
https://www.exploit-db.com/exploits/44806 | 2024-08-05 | |
https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt | 2024-08-05 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html | 2019-10-03 | |
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html | 2019-10-03 | |
https://access.redhat.com/errata/RHSA-2019:2189 | 2019-10-03 | |
https://access.redhat.com/errata/RHSA-2020:0595 | 2019-10-03 | |
https://security.gentoo.org/glsa/201805-14 | 2019-10-03 | |
https://usn.ubuntu.com/3658-1 | 2019-10-03 | |
https://usn.ubuntu.com/3658-3 | 2019-10-03 | |
https://www.debian.org/security/2018/dsa-4208 | 2019-10-03 | |
https://access.redhat.com/security/cve/CVE-2018-1122 | 2020-04-14 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1575466 | 2020-04-14 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Procps-ng Project Search vendor "Procps-ng Project" | Procps-ng Search vendor "Procps-ng Project" for product "Procps-ng" | < 3.3.15 Search vendor "Procps-ng Project" for product "Procps-ng" and version " < 3.3.15" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 12.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "12.04" | esm |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 14.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "14.04" | lts |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 16.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "16.04" | lts |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 17.10 Search vendor "Canonical" for product "Ubuntu Linux" and version "17.10" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 18.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "18.04" | lts |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 7.0 Search vendor "Debian" for product "Debian Linux" and version "7.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 8.0 Search vendor "Debian" for product "Debian Linux" and version "8.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 9.0 Search vendor "Debian" for product "Debian Linux" and version "9.0" | - |
Affected
|