Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2018-1123 : Security Advisory and Response

Learn about CVE-2018-1123, a vulnerability in procps-ng before version 3.3.15 that exposes a denial of service risk in the ps function through a buffer overflow caused by mmap. Find out the impact, affected systems, exploitation mechanism, and mitigation steps.

A vulnerability in procps-ng, prior to version 3.3.15, exposes a denial of service risk in the ps function through a buffer overflow caused by mmap.

Understanding CVE-2018-1123

This CVE entry details a vulnerability in procps-ng that could lead to a denial of service risk.

What is CVE-2018-1123?

CVE-2018-1123 is a vulnerability in procps-ng, specifically before version 3.3.15, that can be exploited to cause a denial of service risk in the ps function due to a buffer overflow triggered by mmap.

The Impact of CVE-2018-1123

The vulnerability in procps-ng, prior to version 3.3.15, could result in a denial of service risk in the ps function through a buffer overflow. However, the impact is limited to a crash, causing a temporary denial of service.

Technical Details of CVE-2018-1123

This section provides technical details of the CVE-2018-1123 vulnerability.

Vulnerability Description

The vulnerability in procps-ng before version 3.3.15 exposes a denial of service risk in the ps function through a buffer overflow caused by mmap. The ps function includes a safeguard that assigns a guard page to the buffer's end, limiting the consequences to a crash.

Affected Systems and Versions

        Product: procps-ng, procps
        Vendor: [UNKNOWN]
        Versions Affected: procps-ng 3.3.15

Exploitation Mechanism

        Attack Complexity: LOW
        Attack Vector: LOCAL
        Privileges Required: LOW
        User Interaction: REQUIRED
        Scope: UNCHANGED
        Confidentiality Impact: NONE
        Integrity Impact: LOW
        Availability Impact: LOW

Mitigation and Prevention

Protecting systems from CVE-2018-1123 involves taking immediate steps and implementing long-term security practices.

Immediate Steps to Take

        Update to procps-ng version 3.3.15 or later to mitigate the vulnerability.
        Monitor vendor advisories for patches and updates related to this issue.

Long-Term Security Practices

        Regularly update software and apply security patches promptly.
        Conduct security audits and vulnerability assessments to identify and address potential risks.

Patching and Updates

        Apply patches provided by the vendor to address the vulnerability.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now