Lucene search

K
ubuntucveUbuntu.comUB:CVE-2018-1125
HistoryMay 17, 2018 - 12:00 a.m.

CVE-2018-1125

2018-05-1700:00:00
ubuntu.com
ubuntu.com
8

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.005 Low

EPSS

Percentile

75.4%

procps-ng before version 3.3.15 is vulnerable to a stack buffer overflow in
pgrep. This vulnerability is mitigated by FORTIFY, as it involves strncat()
to a stack-allocated string. When pgrep is compiled with FORTIFY (as on Red
Hat Enterprise Linux and Fedora), the impact is limited to a crash.

Bugs

Notes

Author Note
mdeslaur [PATCH 008/117] pgrep: Prevent a potential stack-based buffer overflow.
OSVersionArchitecturePackageVersionFilename
ubuntu17.10noarchprocps< 2:3.3.12-1ubuntu2.1UNKNOWN
ubuntu18.04noarchprocps< 2:3.3.12-3ubuntu1.1UNKNOWN
ubuntu14.04noarchprocps< 1:3.3.9-1ubuntu2.3UNKNOWN
ubuntu16.04noarchprocps< 2:3.3.10-4ubuntu2.4UNKNOWN

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.005 Low

EPSS

Percentile

75.4%