CVE-2018-1122

HIGH

procps-ng <3.3.15 - Privilege Escalation

Title source: llm
STIX 2.1

Description

procps-ng before version 3.3.15 is vulnerable to a local privilege escalation in top. If a user runs top with HOME unset in an attacker-controlled directory, the attacker could achieve privilege escalation by exploiting one of several vulnerabilities in the config_file() function.

Exploits (1)

exploitdb WRITEUP
by Qualys Corporation · textlocallinux
https://www.exploit-db.com/exploits/44806

Scores

CVSS v3 7.3
EPSS 0.0025
EPSS Percentile 48.5%
Attack Vector LOCAL
CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

Details

CWE
CWE-829
Status published
Products (9)
canonical/ubuntu_linux 12.04
canonical/ubuntu_linux 14.04
canonical/ubuntu_linux 16.04
canonical/ubuntu_linux 17.10
canonical/ubuntu_linux 18.04
debian/debian_linux 7.0
debian/debian_linux 8.0
debian/debian_linux 9.0
procps-ng_project/procps-ng < 3.3.15
Published May 23, 2018
Tracked Since Feb 18, 2026