CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
AI Score
Confidence
Low
EPSS
Percentile
18.0%
The staprun runtime tool in SystemTap 1.3 does not properly clear the environment before executing modprobe, which allows local users to gain privileges by setting the MODPROBE_OPTIONS environment variable to specify a malicious configuration file.
lists.fedoraproject.org/pipermail/package-announce/2010-November/051115.html
lists.fedoraproject.org/pipermail/package-announce/2010-November/051122.html
lists.fedoraproject.org/pipermail/package-announce/2010-November/051127.html
packetstormsecurity.com/files/152569/SystemTap-1.3-MODPROBE_OPTIONS-Privilege-Escalation.html
secunia.com/advisories/42256
secunia.com/advisories/42263
secunia.com/advisories/42306
secunia.com/advisories/42318
secunia.com/advisories/46920
sources.redhat.com/git/gitweb.cgi?p=systemtap.git%3Ba=commit%3Bh=b7565b41228bea196cefa3a7d43ab67f8f9152e2
sources.redhat.com/ml/systemtap/2010-q4/msg00230.html
www.debian.org/security/2011/dsa-2348
www.exploit-db.com/exploits/15620
www.redhat.com/support/errata/RHSA-2010-0894.html
www.redhat.com/support/errata/RHSA-2010-0895.html
www.securityfocus.com/bid/44914
www.securitytracker.com/id?1024754
exchange.xforce.ibmcloud.com/vulnerabilities/63344
www.exploit-db.com/exploits/46730/