Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.120413
Category:Amazon Linux Local Security Checks
Title:Amazon Linux: Security Advisory (ALAS-2012-54)
Summary:The remote host is missing an update for the 'systemtap' package(s) announced via the ALAS-2012-54 advisory.
Description:Summary:
The remote host is missing an update for the 'systemtap' package(s) announced via the ALAS-2012-54 advisory.

Vulnerability Insight:
An invalid pointer read flaw was found in the way SystemTap handled malformed debugging information in DWARF format. When SystemTap unprivileged mode was enabled, an unprivileged user in the stapusr group could use this flaw to crash the system or, potentially, read arbitrary kernel memory. Additionally, a privileged user (root, or a member of the stapdev group) could trigger this flaw when tricked into instrumenting a specially-crafted ELF binary, even when unprivileged mode was not enabled. (CVE-2012-0875)

Affected Software/OS:
'systemtap' package(s) on Amazon Linux.

Solution:
Please install the updated package(s).

CVSS Score:
5.4

CVSS Vector:
AV:L/AC:M/Au:N/C:P/I:N/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2012-0875
1026777
http://securitytracker.com/id?1026777
RHSA-2012:0376
http://rhn.redhat.com/errata/RHSA-2012-0376.html
[oss-security] 20120222 CVE-2012-0875: systemtap memory disclosure/kernel panic when processing malformed DWARF unwind data
http://permalink.gmane.org/gmane.comp.security.oss.general/6987
http://sourceware.org/bugzilla/show_bug.cgi?id=13714
http://sourceware.org/git/?p=systemtap.git%3Ba=commit%3Bh=64b0cff3b
openSUSE-SU-2013:0475
http://lists.opensuse.org/opensuse-updates/2013-03/msg00057.html
CopyrightCopyright (C) 2015 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.