Vulnerability Details : CVE-2011-2502
runtime/staprun/staprun_funcs.c in the systemtap runtime tool (staprun) in SystemTap before 1.6 does not properly validate modules when a module path is specified by a user for user-space probing, which allows local users in the stapusr group to gain privileges via a crafted module in the search path in the -u argument.
Vulnerability category: Input validation
Products affected by CVE-2011-2502
- cpe:2.3:a:systemtap:systemtap:*:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:1.0:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.7.2:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.7:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.5.9:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.5.8:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.4:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.9.8:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.9.7:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.9.5:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.5.14:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.5.13:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.5.4:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.9:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.8:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.5.12:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.5.10:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.5:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.3:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.9.9:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.6:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.5.7:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.5.5:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:1.1:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:1.3:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:1.2:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:1.4:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2011-2502
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 8 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2011-2502
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.4
|
MEDIUM | AV:L/AC:M/Au:N/C:P/I:P/A:P |
3.4
|
6.4
|
NIST |
CWE ids for CVE-2011-2502
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-2502
-
http://sources.redhat.com/git/gitweb.cgi?p=systemtap.git;a=commitdiff;h=4ecaadf545a729bb3e5f01f6f019716d49815d9a
www.sourceware.org Git - systemtap.git/commitdiffExploit;Patch
-
http://sources.redhat.com/git/gitweb.cgi?p=systemtap.git;a=blob;f=NEWS;hb=304d73b1fea24af791f2a129fb141c5009eae6a8
www.sourceware.org Git - systemtap.git/blob - NEWS
-
https://bugzilla.redhat.com/show_bug.cgi?id=716476
716476 – (CVE-2011-2502) CVE-2011-2502 systemtap: insufficient security check when loading uprobes kernel module
Jump to