SystemTap 1.1 Local Memory Corruption Vulnerabilities

2010.02.11
Credit: Vincent Danen
Risk: High
Local: Yes
Remote: No
CWE: CWE-189


CVSS Base Score: 4.9/10
Impact Subscore: 6.9/10
Exploitability Subscore: 3.9/10
Exploit range: Local
Attack complexity: Low
Authentication: No required
Confidentiality impact: None
Integrity impact: None
Availability impact: Complete

Just a heads up that an issue in SystemTap was found where using the __get_argv() function in tapset could result in a crash of the SystemTap script that calls it (and syscall.execve) or, if it's running as root, could lead to a hang/crash of the system running the script. This flaw has been assigned CVE-2010-0411. More details can be found here: https://bugzilla.redhat.com/show_bug.cgi?id=559719 http://sourceware.org/bugzilla/show_bug.cgi?id=11234 #!/bin/bash while [ "0" = "0" ] ; do HOME=1 /bin/echo /usr/src/kernels/2.6.18-128.el5-PAE-i686/include/*/* cat /proc/slabinfo done

References:

https://bugzilla.redhat.com/show_bug.cgi?id=559719
http://www.securityfocus.com/bid/38120
http://sourceware.org/git/gitweb.cgi?p=systemtap.git;a=commit;h=a2d399c87a642190f08ede63dc6fc434a5a8363a
http://sourceware.org/bugzilla/show_bug.cgi?id=11234
http://secunia.com/advisories/38426
http://marc.info/?l=oss-security&m=126530657715364&w=2


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top