procps-ng before version 3.3.15 is vulnerable to multiple integer overflows leading to a heap corruption in file2strvec function. This allows a privilege escalation for a local attacker who can create entries in procfs by starting processes, which could result in crashes or arbitrary code execution in proc utilities run by other users.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html Mailing List Third Party Advisory
http://seclists.org/oss-sec/2018/q2/122 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/104214 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1041057 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2018:1700 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1777 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1820 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2267 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2268 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:1944 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2401 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1124 Issue Tracking Third Party Advisory
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 Third Party Advisory
https://kc.mcafee.com/corporate/index?page=content&id=SB10241 Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html Third Party Advisory
https://security.gentoo.org/glsa/201805-14 Third Party Advisory
https://usn.ubuntu.com/3658-1/ Third Party Advisory
https://usn.ubuntu.com/3658-2/ Third Party Advisory
https://www.debian.org/security/2018/dsa-4208 Third Party Advisory
https://www.exploit-db.com/exploits/44806/ Third Party Advisory VDB Entry
https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt Exploit Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: redhat

Published: 2018-05-23T13:00:00

Updated: 2019-10-26T23:06:10

Reserved: 2017-12-04T00:00:00


Link: CVE-2018-1124

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2018-05-23T13:29:00.263

Modified: 2020-09-09T14:58:59.730


Link: CVE-2018-1124

JSON object: View

cve-icon Redhat Information

No data.