Vulnerability CVE-2009-4273


Published: 2010-01-26   Modified: 2012-02-13

Description:
stap-server in SystemTap before 1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in stap command-line arguments in a request.

Type:

CWE-94

(Improper Control of Generation of Code ('Code Injection'))

CVSS2 => (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
10/10
10/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Systemtap -> Systemtap 

 References:
http://sourceware.org/systemtap/ftp/releases/systemtap-1.1.tar.gz
http://lists.fedoraproject.org/pipermail/package-announce/2010-January/034041.html
https://bugzilla.redhat.com/show_bug.cgi?id=550172
http://www.vupen.com/english/advisories/2010/1001
http://www.vupen.com/english/advisories/2010/0169
http://www.redhat.com/support/errata/RHSA-2010-0124.html
http://sourceware.org/ml/systemtap/2010-q1/msg00142.html
http://sourceware.org/bugzilla/show_bug.cgi?id=11105
http://secunia.com/advisories/39656
http://secunia.com/advisories/38765
http://secunia.com/advisories/38216
http://secunia.com/advisories/38154
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11417
http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00006.html
http://lists.fedoraproject.org/pipermail/scm-commits/2010-February/394714.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-January/034036.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035261.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035201.html

Copyright 2024, cxsecurity.com

 

Back to Top