Vulnerability Description
procps-ng before version 3.3.15 is vulnerable to a denial of service in ps via mmap buffer overflow. Inbuilt protection in ps maps a guard page at the end of the overflowed buffer, ensuring that the impact of this flaw is limited to a crash (temporary denial of service).
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Procps-Ng Project | Procps-Ng | < 3.3.15 |
| Canonical | Ubuntu Linux | 12.04 |
| Debian | Debian Linux | 7.0 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html
- http://seclists.org/oss-sec/2018/q2/122Mailing ListThird Party Advisory
- http://www.securityfocus.com/bid/104214Third Party AdvisoryVDB Entry
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1123Issue TrackingPatchThird Party Advisory
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e3
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8
- https://lists.debian.org/debian-lts-announce/2018/05/msg00021.htmlThird Party Advisory
- https://security.gentoo.org/glsa/201805-14Third Party Advisory
- https://usn.ubuntu.com/3658-1/Third Party Advisory
- https://usn.ubuntu.com/3658-3/Third Party Advisory
- https://www.debian.org/security/2018/dsa-4208Third Party Advisory
- https://www.exploit-db.com/exploits/44806/Third Party AdvisoryVDB Entry
- https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txtExploitThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html
FAQ
What is CVE-2018-1123?
CVE-2018-1123 is a vulnerability with a CVSS score of 3.9 (LOW). procps-ng before version 3.3.15 is vulnerable to a denial of service in ps via mmap buffer overflow. Inbuilt protection in ps maps a guard page at the end of the overflowed buffer, ensuring that the i...
How severe is CVE-2018-1123?
CVE-2018-1123 has been rated LOW with a CVSS base score of 3.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-1123?
Check the references section above for vendor advisories and patch information. Affected products include: Procps-Ng Project Procps-Ng, Canonical Ubuntu Linux, Debian Debian Linux.