Wind River Support Network

HomeDefectsLIN6-14607
Fixed

LIN6-14607 : Security Advisory - procps - CVE-2018-1124

Created: May 24, 2018    Updated: Dec 16, 2018
Resolved Date: Nov 18, 2018
Found In Version: 6.0.0.36
Fix Version: 6.0.0.38
Severity: Standard
Applicable for: Wind River Linux 6
Component/s: Userspace

Description

Local Privilege Escalation in libprocps (CVE-2018-1124)

  An attacker can exploit an integer overflow in libprocps's
  file2strvec() function and carry out an LPE when another user,
  administrator, or script executes a vulnerable utility (pgrep, pidof,
  pkill, and w are vulnerable by default; other utilities are vulnerable
  if executed with non-default options). Moreover, an attacker's process
  running inside a container can trigger this vulnerability in a utility
  running outside the container: the attacker can exploit this userland
  vulnerability and break out of the container or chroot. We will
  publish our proof-of-concept exploits in the near future.

https://security.archlinux.org/CVE-2018-1124
https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt

Other Downloads


Live chat
Online