Lucene search

K
cvelistRedhatCVELIST:CVE-2018-1125
HistoryMay 23, 2018 - 2:00 p.m.

CVE-2018-1125

2018-05-2314:00:00
CWE-121
redhat
www.cve.org

4.4 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L

7.7 High

AI Score

Confidence

High

0.005 Low

EPSS

Percentile

75.6%

procps-ng before version 3.3.15 is vulnerable to a stack buffer overflow in pgrep. This vulnerability is mitigated by FORTIFY, as it involves strncat() to a stack-allocated string. When pgrep is compiled with FORTIFY (as on Red Hat Enterprise Linux and Fedora), the impact is limited to a crash.

CNA Affected

[
  {
    "product": "procps-ng, procps",
    "vendor": "[UNKNOWN]",
    "versions": [
      {
        "status": "affected",
        "version": "procps-ng 3.3.15"
      }
    ]
  }
]

4.4 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L

7.7 High

AI Score

Confidence

High

0.005 Low

EPSS

Percentile

75.6%