Vulnerability Details : CVE-2011-2503
Potential exploit
The insert_module function in runtime/staprun/staprun_funcs.c in the systemtap runtime tool (staprun) in SystemTap before 1.6 does not properly validate a module when loading it, which allows local users to gain privileges via a race condition between the signature validation and the module initialization.
Vulnerability category: Input validation
Products affected by CVE-2011-2503
- cpe:2.3:a:systemtap:systemtap:*:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:1.0:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.7.2:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.7:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.5.9:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.5.8:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.4:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.9.8:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.9.7:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.9.5:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.5.14:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.5.13:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.5.4:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.9:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.8:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.5.12:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.5.10:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.5:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.3:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.9.9:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.6:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.5.7:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.5.5:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:1.1:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:1.3:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:1.2:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:1.4:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2011-2503
0.07%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 19 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2011-2503
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
3.7
|
LOW | AV:L/AC:H/Au:N/C:P/I:P/A:P |
1.9
|
6.4
|
NIST |
CWE ids for CVE-2011-2503
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-2503
-
http://www.debian.org/security/2011/dsa-2348
Debian -- Security Information -- DSA-2348-1 systemtap
-
http://sources.redhat.com/git/gitweb.cgi?p=systemtap.git;a=commitdiff;h=ed51cfa24ca27746ab09b59280b94117dd58cba3
www.sourceware.org Git - systemtap.git/commitdiffExploit;Patch
-
http://sources.redhat.com/git/gitweb.cgi?p=systemtap.git;a=blob;f=NEWS;hb=304d73b1fea24af791f2a129fb141c5009eae6a8
www.sourceware.org Git - systemtap.git/blob - NEWS
-
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-2503
716489 – (CVE-2011-2503) CVE-2011-2503 systemtap: signed module loading race condition
Jump to