Lucene search

K
ubuntucveUbuntu.comUB:CVE-2018-1126
HistoryMay 17, 2018 - 12:00 a.m.

CVE-2018-1126

2018-05-1700:00:00
ubuntu.com
ubuntu.com
14

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.005 Low

EPSS

Percentile

77.1%

procps-ng before version 3.3.15 is vulnerable to an incorrect integer size
in proc/alloc.* leading to truncation/integer overflow issues. This flaw is
related to CVE-2018-1124.

Notes

Author Note
mdeslaur [PATCH 035/117] proc/alloc.*: Use size_t, not unsigned int.
OSVersionArchitecturePackageVersionFilename
ubuntu17.10noarchprocps< 2:3.3.12-1ubuntu2.1UNKNOWN
ubuntu18.04noarchprocps< 2:3.3.12-3ubuntu1.1UNKNOWN
ubuntu14.04noarchprocps< 1:3.3.9-1ubuntu2.3UNKNOWN
ubuntu16.04noarchprocps< 2:3.3.10-4ubuntu2.4UNKNOWN

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.005 Low

EPSS

Percentile

77.1%