CVSS2
Attack Vector
LOCAL
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:L/AC:H/Au:N/C:N/I:N/A:P
AI Score
Confidence
High
EPSS
Percentile
5.1%
SystemTap 1.4 and earlier, when unprivileged (aka stapusr) mode is enabled, allows local users to cause a denial of service (divide-by-zero error and OOPS) via a crafted ELF program with DWARF expressions that are not properly handled by a stap script that performs context variable access.
Vendor | Product | Version | CPE |
---|---|---|---|
systemtap | systemtap | 0.7 | cpe:/a:systemtap:systemtap:0.7::: |
systemtap | systemtap | 0.5.14 | cpe:/a:systemtap:systemtap:0.5.14::: |
systemtap | systemtap | 0.9.7 | cpe:/a:systemtap:systemtap:0.9.7::: |
systemtap | systemtap | 0.5.3 | cpe:/a:systemtap:systemtap:0.5.3::: |
systemtap | systemtap | 0.5.12 | cpe:/a:systemtap:systemtap:0.5.12::: |
systemtap | systemtap | 0.9.9 | cpe:/a:systemtap:systemtap:0.9.9::: |
systemtap | systemtap | 0.5.13 | cpe:/a:systemtap:systemtap:0.5.13::: |
systemtap | systemtap | 1.3 | cpe:/a:systemtap:systemtap:1.3::: |
systemtap | systemtap | 0.9 | cpe:/a:systemtap:systemtap:0.9::: |
systemtap | systemtap | cpe:/a:systemtap:systemtap:::: |
openwall.com/lists/oss-security/2011/05/20/2
secunia.com/advisories/44802
sourceware.org/git/?p=systemtap.git%3Ba=commit%3Bh=fa2e3415185a28542d419a641ecd6cddd52e3cd9
www.mandriva.com/security/advisories?name=MDVSA-2011:154
www.mandriva.com/security/advisories?name=MDVSA-2011:155
www.securityfocus.com/bid/47934
bugzilla.redhat.com/show_bug.cgi?id=702687
rhn.redhat.com/errata/RHSA-2011-0842.html