Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.120413
Categoría:Amazon Linux Local Security Checks
Título:Amazon Linux: Security Advisory (ALAS-2012-54)
Resumen:The remote host is missing an update for the 'systemtap' package(s) announced via the ALAS-2012-54 advisory.
Descripción:Summary:
The remote host is missing an update for the 'systemtap' package(s) announced via the ALAS-2012-54 advisory.

Vulnerability Insight:
An invalid pointer read flaw was found in the way SystemTap handled malformed debugging information in DWARF format. When SystemTap unprivileged mode was enabled, an unprivileged user in the stapusr group could use this flaw to crash the system or, potentially, read arbitrary kernel memory. Additionally, a privileged user (root, or a member of the stapdev group) could trigger this flaw when tricked into instrumenting a specially-crafted ELF binary, even when unprivileged mode was not enabled. (CVE-2012-0875)

Affected Software/OS:
'systemtap' package(s) on Amazon Linux.

Solution:
Please install the updated package(s).

CVSS Score:
5.4

CVSS Vector:
AV:L/AC:M/Au:N/C:P/I:N/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2012-0875
1026777
http://securitytracker.com/id?1026777
RHSA-2012:0376
http://rhn.redhat.com/errata/RHSA-2012-0376.html
[oss-security] 20120222 CVE-2012-0875: systemtap memory disclosure/kernel panic when processing malformed DWARF unwind data
http://permalink.gmane.org/gmane.comp.security.oss.general/6987
http://sourceware.org/bugzilla/show_bug.cgi?id=13714
http://sourceware.org/git/?p=systemtap.git%3Ba=commit%3Bh=64b0cff3b
openSUSE-SU-2013:0475
http://lists.opensuse.org/opensuse-updates/2013-03/msg00057.html
CopyrightCopyright (C) 2015 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.