Severity
7.5HIGH
EPSS
0.4%
top 39.09%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 23
Latest updateMay 13

Description

procps-ng before version 3.3.15 is vulnerable to a stack buffer overflow in pgrep. This vulnerability is mitigated by FORTIFY, as it involves strncat() to a stack-allocated string. When pgrep is compiled with FORTIFY (as on Red Hat Enterprise Linux and Fedora), the impact is limited to a crash.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

Debianprocps< 2:3.3.15-1+3
NVDopensuse/leap15.1

Also affects: Debian Linux 7.0, 8.0, 9.0, Ubuntu Linux 12.04, 14.04, 16.04, 17.10, 18.04

🔴Vulnerability Details

4
GHSA
GHSA-jpw5-97m6-c8m2: procps-ng before version 32022-05-13
CVEList
CVE-2018-1125: procps-ng before version 32018-05-23
OSV
CVE-2018-1125: procps-ng before version 32018-05-23
OSV
procps vulnerabilities2018-05-23

💥Exploits & PoCs

1
Exploit-DB
MyBB ChangUonDyU Plugin 1.0.2 - Cross-Site Scripting2018-05-29

📋Vendor Advisories

5
Red Hat
kernel: hw: Spectre SWAPGS gadget vulnerability2019-08-06
Ubuntu
procps-ng vulnerabilities2018-08-16
Ubuntu
procps-ng vulnerabilities2018-05-23
Red Hat
procps: stack buffer overflow in pgrep2018-05-17
Debian
CVE-2018-1125: procps - procps-ng before version 3.3.15 is vulnerable to a stack buffer overflow in pgre...2018

💬Community

2
Bugzilla
CVE-2018-1125 procps-ng: procps-ng, procps: stack buffer overflow in pgrep [fedora-28]2018-05-18
Bugzilla
CVE-2018-1125 procps-ng, procps: stack buffer overflow in pgrep2018-05-08