{"containers":{"cna":{"affected":[{"product":"procps-ng, procps","vendor":"[UNKNOWN]","versions":[{"status":"affected","version":"up to procps-ng 3.3.15 and newer"}]}],"datePublic":"2018-05-17T00:00:00.000Z","descriptions":[{"lang":"en","value":"procps-ng, procps is vulnerable to a process hiding through race condition. Since the kernel's proc_pid_readdir() returns PID entries in ascending numeric order, a process occupying a high PID can use inotify events to determine when the process list is being scanned, and fork/exec to obtain a lower PID, thus avoiding enumeration. An unprivileged attacker can hide a process from procps-ng's utilities by exploiting a race condition in reading /proc/PID entries. This vulnerability affects procps and procps-ng up to version 3.3.15, newer versions might be affected also."}],"metrics":[{"cvssV3_0":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"LOW","baseScore":3.9,"baseSeverity":"LOW","confidentialityImpact":"NONE","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L","version":"3.0"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-367","description":"CWE-367","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2020-06-30T15:26:18.000Z","orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat"},"references":[{"name":"44806","tags":["exploit","x_refsource_EXPLOIT-DB"],"url":"https://www.exploit-db.com/exploits/44806/"},{"tags":["x_refsource_CONFIRM"],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1121"},{"name":"104214","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/104214"},{"name":"[oss-security] 20180517 Qualys Security Advisory - Procps-ng Audit Report","tags":["mailing-list","x_refsource_MLIST"],"url":"http://seclists.org/oss-sec/2018/q2/122"},{"tags":["x_refsource_MISC"],"url":"https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt"}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-05T03:51:48.742Z"},"title":"CVE Program Container","references":[{"name":"44806","tags":["exploit","x_refsource_EXPLOIT-DB","x_transferred"],"url":"https://www.exploit-db.com/exploits/44806/"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1121"},{"name":"104214","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/104214"},{"name":"[oss-security] 20180517 Qualys Security Advisory - Procps-ng Audit Report","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"http://seclists.org/oss-sec/2018/q2/122"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt"}]}]},"cveMetadata":{"assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","cveId":"CVE-2018-1121","datePublished":"2018-06-13T20:00:00.000Z","dateReserved":"2017-12-04T00:00:00.000Z","dateUpdated":"2024-08-05T03:51:48.742Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}