SB2020122909 - Privilege escalation in procps-ng component in F5 Traffix SDC



SB2020122909 - Privilege escalation in procps-ng component in F5 Traffix SDC

Published: December 29, 2020

Security Bulletin ID SB2020122909
Severity
Low
Patch available
NO
Number of vulnerabilities 1
Exploitation vector Local access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Privilege escalation (CVE-ID: CVE-2018-1122)

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The weakness exists due to top reads its configuration file from the current working directory, without any security check, if the HOME environment variable is unset or empty. A local attacker can exploit one of several vulnerabilities in top's config_file() function, execute top in /tmp (for example) and gain elevated privileges.

Remediation

Cybersecurity Help is not aware of any official remediation provided by the vendor.