Vulnerability Description
procps-ng before version 3.3.15 is vulnerable to a local privilege escalation in top. If a user runs top with HOME unset in an attacker-controlled directory, the attacker could achieve privilege escalation by exploiting one of several vulnerabilities in the config_file() function.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Procps-Ng Project | Procps-Ng | < 3.3.15 |
| Canonical | Ubuntu Linux | 12.04 |
| Debian | Debian Linux | 7.0 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html
- http://seclists.org/oss-sec/2018/q2/122Mailing ListThird Party Advisory
- http://www.securityfocus.com/bid/104214Third Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHSA-2019:2189
- https://access.redhat.com/errata/RHSA-2020:0595
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1122Issue TrackingThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2018/05/msg00021.htmlThird Party Advisory
- https://security.gentoo.org/glsa/201805-14Third Party Advisory
- https://usn.ubuntu.com/3658-1/Third Party Advisory
- https://usn.ubuntu.com/3658-3/Third Party Advisory
- https://www.debian.org/security/2018/dsa-4208Third Party Advisory
- https://www.exploit-db.com/exploits/44806/ExploitThird Party AdvisoryVDB Entry
- https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txtExploitThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html
FAQ
What is CVE-2018-1122?
CVE-2018-1122 is a vulnerability with a CVSS score of 7.3 (HIGH). procps-ng before version 3.3.15 is vulnerable to a local privilege escalation in top. If a user runs top with HOME unset in an attacker-controlled directory, the attacker could achieve privilege escal...
How severe is CVE-2018-1122?
CVE-2018-1122 has been rated HIGH with a CVSS base score of 7.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-1122?
Check the references section above for vendor advisories and patch information. Affected products include: Procps-Ng Project Procps-Ng, Canonical Ubuntu Linux, Debian Debian Linux.