Stack Buffer Overflow in Procps-ng Affects Multiple Linux Distributions
CVE-2018-1125
4.4MEDIUM
What is CVE-2018-1125?
The Procps-ng package, specifically the pgrep utility, is affected by a stack buffer overflow vulnerability that occurs in versions prior to 3.3.15. This flaw can lead to potential application crashes, although its impact is mitigated when FORTIFY is enabled, as seen in Red Hat Enterprise Linux and Fedora environments. In such cases, the severity of the vulnerability is lessened, but it remains critical for environments without these protections. Various Linux distributions are thus affected, necessitating an upgrade to ensure security and reliability.
Affected Version(s)
procps-ng, procps procps-ng 3.3.15
References
CVSS V3.1
Score:
4.4
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
CVSS V3.0
Score:
4.4
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
