First published: Mon May 07 2018(Updated: )
If the HOME environment variable is unset or empty, top will read its configuration file from the current working directory without any security check. If a user runs top with HOME unset in an attacker-controlled directory, the attacker could acieve privilege escalation by exploiting one of several vulnerabilities in the config_file() function.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Procps-ng Project Procps-ng | <3.3.15 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =17.10 | |
Canonical Ubuntu Linux | =18.04 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
redhat/procps-ng | <3.3.15 | 3.3.15 |
debian/procps | 2:3.3.17-5 2:4.0.2-3 2:4.0.4-6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1122 is a vulnerability in procps-ng that allows for a local privilege escalation in top.
The vulnerability occurs when top is run with HOME unset in an attacker-controlled directory, allowing the attacker to exploit vulnerabilities in the config_file() function and gain escalated privileges.
CVE-2018-1122 has a severity rating of high (7 out of 10).
Versions of procps-ng before 3.3.15 and certain versions of procps on Red Hat, Debian, and Ubuntu are affected by CVE-2018-1122.
To fix CVE-2018-1122, upgrade to procps-ng version 3.3.15 or higher, or apply the appropriate remedy provided by your distribution.