CVE Vulnerabilities

CVE-2018-1122

Published: May 23, 2018 | Modified: Oct 03, 2019
CVSS 3.x
7
HIGH
Source:
NVD
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
4.4 MEDIUM
AV:L/AC:M/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
6.7 MODERATE
CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
Ubuntu
MEDIUM

procps-ng before version 3.3.15 is vulnerable to a local privilege escalation in top. If a user runs top with HOME unset in an attacker-controlled directory, the attacker could achieve privilege escalation by exploiting one of several vulnerabilities in the config_file() function.

Affected Software

Name Vendor Start Version End Version
Procps-ng Procps-ng_project * 3.3.15 (excluding)
Procps Ubuntu artful *
Procps Ubuntu bionic *
Procps Ubuntu devel *
Procps Ubuntu trusty *
Procps Ubuntu upstream *
Procps Ubuntu xenial *
Red Hat Ansible Tower 3.4 for RHEL 7 RedHat ansible-tower-34/ansible-tower-memcached:1.4.15-28 *
Red Hat Ansible Tower 3.4 for RHEL 7 RedHat ansible-tower-35/ansible-tower-memcached:1.4.15-28 *
Red Hat Ansible Tower 3.4 for RHEL 7 RedHat ansible-tower-37/ansible-tower-memcached-rhel7:1.4.15-28 *
Red Hat Enterprise Linux 7 RedHat procps-ng-0:3.3.10-26.el7 *
Red Hat Enterprise Linux 7.4 Advanced Update Support RedHat procps-ng-0:3.3.10-16.el7_4.2 *
Red Hat Enterprise Linux 7.4 Telco Extended Update Support RedHat procps-ng-0:3.3.10-16.el7_4.2 *
Red Hat Enterprise Linux 7.4 Update Services for SAP Solutions RedHat procps-ng-0:3.3.10-16.el7_4.2 *
Red Hat Enterprise Linux 7.5 Extended Update Support RedHat procps-ng-0:3.3.10-17.el7_5.4 *
Red Hat Enterprise Linux 7.6 Extended Update Support RedHat procps-ng-0:3.3.10-23.el7_6.2 *

References