ID CVE-2018-1125
Summary procps-ng before version 3.3.15 is vulnerable to a stack buffer overflow in pgrep. This vulnerability is mitigated by FORTIFY, as it involves strncat() to a stack-allocated string. When pgrep is compiled with FORTIFY (as on Red Hat Enterprise Linux and Fedora), the impact is limited to a crash.
References
Vulnerable Configurations
  • cpe:2.3:a:procps-ng_project:procps-ng:3.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:procps-ng_project:procps-ng:3.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:procps-ng_project:procps-ng:3.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:procps-ng_project:procps-ng:3.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:procps-ng_project:procps-ng:3.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:procps-ng_project:procps-ng:3.3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:procps-ng_project:procps-ng:3.3.3:*:*:*:*:*:*:*
    cpe:2.3:a:procps-ng_project:procps-ng:3.3.3:*:*:*:*:*:*:*
  • cpe:2.3:a:procps-ng_project:procps-ng:3.3.4:*:*:*:*:*:*:*
    cpe:2.3:a:procps-ng_project:procps-ng:3.3.4:*:*:*:*:*:*:*
  • cpe:2.3:a:procps-ng_project:procps-ng:3.3.5:*:*:*:*:*:*:*
    cpe:2.3:a:procps-ng_project:procps-ng:3.3.5:*:*:*:*:*:*:*
  • cpe:2.3:a:procps-ng_project:procps-ng:3.3.6:*:*:*:*:*:*:*
    cpe:2.3:a:procps-ng_project:procps-ng:3.3.6:*:*:*:*:*:*:*
  • cpe:2.3:a:procps-ng_project:procps-ng:3.3.7:*:*:*:*:*:*:*
    cpe:2.3:a:procps-ng_project:procps-ng:3.3.7:*:*:*:*:*:*:*
  • cpe:2.3:a:procps-ng_project:procps-ng:3.3.8:*:*:*:*:*:*:*
    cpe:2.3:a:procps-ng_project:procps-ng:3.3.8:*:*:*:*:*:*:*
  • cpe:2.3:a:procps-ng_project:procps-ng:3.3.9:*:*:*:*:*:*:*
    cpe:2.3:a:procps-ng_project:procps-ng:3.3.9:*:*:*:*:*:*:*
  • cpe:2.3:a:procps-ng_project:procps-ng:3.3.10:*:*:*:*:*:*:*
    cpe:2.3:a:procps-ng_project:procps-ng:3.3.10:*:*:*:*:*:*:*
  • cpe:2.3:a:procps-ng_project:procps-ng:3.3.11:*:*:*:*:*:*:*
    cpe:2.3:a:procps-ng_project:procps-ng:3.3.11:*:*:*:*:*:*:*
  • cpe:2.3:a:procps-ng_project:procps-ng:3.3.12:*:*:*:*:*:*:*
    cpe:2.3:a:procps-ng_project:procps-ng:3.3.12:*:*:*:*:*:*:*
  • cpe:2.3:a:procps-ng_project:procps-ng:3.3.13:-:*:*:*:*:*:*
    cpe:2.3:a:procps-ng_project:procps-ng:3.3.13:-:*:*:*:*:*:*
  • cpe:2.3:a:procps-ng_project:procps-ng:3.3.13:rc1:*:*:*:*:*:*
    cpe:2.3:a:procps-ng_project:procps-ng:3.3.13:rc1:*:*:*:*:*:*
  • cpe:2.3:a:procps-ng_project:procps-ng:3.3.14:*:*:*:*:*:*:*
    cpe:2.3:a:procps-ng_project:procps-ng:3.3.14:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
  • cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
  • cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
    cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 09-09-2020 - 14:59)
Impact:
Exploitability:
CWE CWE-787
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
refmap via4
bid 104214
confirm https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1125
debian DSA-4208
misc https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
mlist
  • [debian-lts-announce] 20180531 [SECURITY] [DLA 1390-1] procps security update
  • [oss-security] 20180517 Qualys Security Advisory - Procps-ng Audit Report
suse
  • openSUSE-SU-2019:2376
  • openSUSE-SU-2019:2379
ubuntu
  • USN-3658-1
  • USN-3658-3
Last major update 09-09-2020 - 14:59
Published 23-05-2018 - 14:29
Last modified 09-09-2020 - 14:59
Back to Top