CVE-2018-1123

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

procps-ng before version 3.3.15 is vulnerable to a denial of service in ps via mmap buffer overflow. Inbuilt protection in ps maps a guard page at the end of the overflowed buffer, ensuring that the impact of this flaw is limited to a crash (temporary denial of service).

References

https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt

https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1123

http://seclists.org/oss-sec/2018/q2/122

https://www.debian.org/security/2018/dsa-4208

https://usn.ubuntu.com/3658-1/

http://www.securityfocus.com/bid/104214

https://www.exploit-db.com/exploits/44806/

https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html

https://usn.ubuntu.com/3658-3/

https://security.gentoo.org/glsa/201805-14

http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html

http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html

https://lists.apache.org/thread.html/[email protected]%3Cissues.bookkeeper.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cissues.bookkeeper.apache.org%3E

Details

Source: MITRE

Published: 2018-05-23

Updated: 2021-06-29

Type: CWE-122

Risk Information

CVSS v2

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM

CVSS v3

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Impact Score: 3.6

Exploitability Score: 3.9

Severity: HIGH

Tenable Plugins

View all (21 total)

IDNameProductFamilySeverity
130334openSUSE Security Update : procps (openSUSE-2019-2379)NessusSuSE Local Security Checks
critical
130333openSUSE Security Update : procps (openSUSE-2019-2376)NessusSuSE Local Security Checks
critical
130145SUSE SLED15 / SLES15 Security Update : procps (SUSE-SU-2019:2730-1)NessusSuSE Local Security Checks
critical
122607openSUSE Security Update : procps (openSUSE-2019-291)NessusSuSE Local Security Checks
critical
122361SUSE SLED12 / SLES12 Security Update : procps (SUSE-SU-2019:0450-1)NessusSuSE Local Security Checks
critical
121983Photon OS 2.0: Procps PHSA-2018-2.0-0084NessusPhotonOS Local Security Checks
critical
121877Photon OS 1.0: Procps PHSA-2018-1.0-0175NessusPhotonOS Local Security Checks
critical
119211SUSE SLED12 / SLES12 Security Update : procps (SUSE-SU-2018:2451-2)NessusSuSE Local Security Checks
critical
118428EulerOS Virtualization 2.5.0 : procps-ng (EulerOS-SA-2018-1340)NessusHuawei Local Security Checks
critical
118414EulerOS Virtualization 2.5.1 : procps-ng (EulerOS-SA-2018-1326)NessusHuawei Local Security Checks
high
112035Photon OS 2.0: Openssl / Procps-ng / Perl PHSA-2018-2.0-0084 (deprecated)NessusPhotonOS Local Security Checks
critical
111650EulerOS 2.0 SP3 : procps-ng (EulerOS-SA-2018-1230)NessusHuawei Local Security Checks
high
111264SUSE SLES11 Security Update : procps (SUSE-SU-2018:2042-1)NessusSuSE Local Security Checks
critical
110862EulerOS 2.0 SP2 : procps-ng (EulerOS-SA-2018-1198)NessusHuawei Local Security Checks
critical
110830openSUSE Security Update : procps (openSUSE-2018-685)NessusSuSE Local Security Checks
critical
110804SUSE SLED12 / SLES12 Security Update : procps (SUSE-SU-2018:1836-1)NessusSuSE Local Security Checks
critical
110312Debian DLA-1390-1 : procps security updateNessusDebian Local Security Checks
critical
110255GLSA-201805-14 : procps: Multiple vulnerabilitiesNessusGentoo Local Security Checks
high
110094Ubuntu 14.04 LTS / 16.04 LTS / 17.10 / 18.04 LTS : procps-ng vulnerabilities (USN-3658-1)NessusUbuntu Local Security Checks
critical
109969Debian DSA-4208-1 : procps - security updateNessusDebian Local Security Checks
critical
109950Slackware 14.2 / current : procps-ng (SSA:2018-142-03)NessusSlackware Local Security Checks
critical