Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2018-1121 — Time-of-check Time-of-use (TOCTOU) Race Condition in Project Procps
Severity
5.9MEDIUMNVD
CNA3.9
EPSS
2.0%
top 16.37%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedJun 13
Latest updateMay 13
Description
procps-ng, procps is vulnerable to a process hiding through race condition. Since the kernel's proc_pid_readdir() returns PID entries in ascending numeric order, a process occupying a high PID can use inotify events to determine when the process list is being scanned, and fork/exec to obtain a lower PID, thus avoiding enumeration. An unprivileged attacker can hide a process from procps-ng's utilities by exploiting a race condition in reading /proc/PID entries. This vulnerability affects procps a…
CVSS vector
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:NExploitability: 2.2 | Impact: 3.6
Affected Packages2 packages
🔴Vulnerability Details
3GHSA▶
GHSA-2r59-6pxx-3wqv: procps-ng, procps is vulnerable to a process hiding through race condition↗2022-05-13
OSV▶
CVE-2018-1121: procps-ng, procps is vulnerable to a process hiding through race condition↗2018-06-13
CVEList▶
CVE-2018-1121: procps-ng, procps is vulnerable to a process hiding through race condition↗2018-06-13