Vulnerability Details CVE-2018-1125
procps-ng before version 3.3.15 is vulnerable to a stack buffer overflow in pgrep. This vulnerability is mitigated by FORTIFY, as it involves strncat() to a stack-allocated string. When pgrep is compiled with FORTIFY (as on Red Hat Enterprise Linux and Fedora), the impact is limited to a crash.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.004
EPSS Ranking 59.9%
CVSS Severity
CVSS v3 Score 4.4
CVSS v2 Score 5.0
Products affected by CVE-2018-1125
-
cpe:2.3:a:procps-ng_project:procps-ng:3.3.0
-
cpe:2.3:a:procps-ng_project:procps-ng:3.3.1
-
cpe:2.3:a:procps-ng_project:procps-ng:3.3.10
-
cpe:2.3:a:procps-ng_project:procps-ng:3.3.11
-
cpe:2.3:a:procps-ng_project:procps-ng:3.3.12
-
cpe:2.3:a:procps-ng_project:procps-ng:3.3.13
-
cpe:2.3:a:procps-ng_project:procps-ng:3.3.14
-
cpe:2.3:a:procps-ng_project:procps-ng:3.3.2
-
cpe:2.3:a:procps-ng_project:procps-ng:3.3.3
-
cpe:2.3:a:procps-ng_project:procps-ng:3.3.4
-
cpe:2.3:a:procps-ng_project:procps-ng:3.3.5
-
cpe:2.3:a:procps-ng_project:procps-ng:3.3.6
-
cpe:2.3:a:procps-ng_project:procps-ng:3.3.7
-
cpe:2.3:a:procps-ng_project:procps-ng:3.3.8
-
cpe:2.3:a:procps-ng_project:procps-ng:3.3.9
-
cpe:2.3:o:canonical:ubuntu_linux:12.04
-
cpe:2.3:o:canonical:ubuntu_linux:14.04
-
cpe:2.3:o:canonical:ubuntu_linux:16.04
-
cpe:2.3:o:canonical:ubuntu_linux:17.10
-
cpe:2.3:o:canonical:ubuntu_linux:18.04
-
cpe:2.3:o:debian:debian_linux:7.0
-
cpe:2.3:o:debian:debian_linux:8.0
-
cpe:2.3:o:debian:debian_linux:9.0
-
cpe:2.3:o:opensuse:leap:15.1