Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.880651
Category:CentOS Local Security Checks
Title:CentOS Update for systemtap CESA-2010:0124 centos5 i386
Summary:The remote host is missing an update for the 'systemtap'; package(s) announced via the referenced advisory.
Description:Summary:
The remote host is missing an update for the 'systemtap'
package(s) announced via the referenced advisory.

Vulnerability Insight:
SystemTap is an instrumentation system for systems running the Linux
kernel, version 2.6. Developers can write scripts to collect data on the
operation of the system.

A flaw was found in the SystemTap compile server, stap-server, an optional
component of SystemTap. This server did not adequately sanitize input
provided by the stap-client program, which may allow a remote user to
execute arbitrary shell code with the privileges of the compile server
process, which could possibly be running as the root user. (CVE-2009-4273)

Note: stap-server is not run by default. It must be started by a user or
administrator.

A buffer overflow flaw was found in SystemTap's tapset __get_argv()
function. If a privileged user ran a SystemTap script that called this
function, a local, unprivileged user could, while that script is still
running, trigger this flaw and cause memory corruption by running a command
with a large argument list, which may lead to a system crash or,
potentially, arbitrary code execution with root privileges. (CVE-2010-0411)

Note: SystemTap scripts that call __get_argv(), being a privileged
function, can only be executed by the root user or users in the stapdev
group. As well, if such a script was compiled and installed by root, users
in the stapusr group would also be able to execute it.

SystemTap users should upgrade to these updated packages, which contain
backported patches to correct these issues.

Affected Software/OS:
systemtap on CentOS 5

Solution:
Please install the updated packages.

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2009-4273
38154
http://secunia.com/advisories/38154
38216
http://secunia.com/advisories/38216
38765
http://secunia.com/advisories/38765
39656
http://secunia.com/advisories/39656
ADV-2010-0169
http://www.vupen.com/english/advisories/2010/0169
ADV-2010-1001
http://www.vupen.com/english/advisories/2010/1001
FEDORA-2010-0671
http://lists.fedoraproject.org/pipermail/package-announce/2010-January/034036.html
FEDORA-2010-0688
http://lists.fedoraproject.org/pipermail/package-announce/2010-January/034041.html
FEDORA-2010-1373
http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035201.html
FEDORA-2010-1720
http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035261.html
RHSA-2010:0124
http://www.redhat.com/support/errata/RHSA-2010-0124.html
SUSE-SR:2010:010
http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00006.html
[scm-commits] 20100215 rpms/systemtap/devel systemtap-1.1-tighten-server-params.patch, NONE, 1.1 systemtap.spec, 1.59, 1.60
http://lists.fedoraproject.org/pipermail/scm-commits/2010-February/394714.html
[systemtap] 20100115 SystemTap release 1.1
http://sourceware.org/ml/systemtap/2010-q1/msg00142.html
http://sourceware.org/bugzilla/show_bug.cgi?id=11105
http://sourceware.org/systemtap/ftp/releases/systemtap-1.1.tar.gz
https://bugzilla.redhat.com/show_bug.cgi?id=550172
oval:org.mitre.oval:def:11417
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11417
Common Vulnerability Exposure (CVE) ID: CVE-2010-0411
1023664
http://securitytracker.com/id?1023664
38120
http://www.securityfocus.com/bid/38120
38426
http://secunia.com/advisories/38426
38680
http://secunia.com/advisories/38680
38817
http://secunia.com/advisories/38817
RHSA-2010:0125
http://www.redhat.com/support/errata/RHSA-2010-0125.html
[oss-security] 20100204 systemtap DoS issue (CVE-2010-0411)
http://marc.info/?l=oss-security&m=126530657715364&w=2
http://sourceware.org/bugzilla/show_bug.cgi?id=11234
http://sourceware.org/git/gitweb.cgi?p=systemtap.git%3Ba=commit%3Bh=a2d399c87a642190f08ede63dc6fc434a5a8363a
https://bugzilla.redhat.com/show_bug.cgi?id=559719
oval:org.mitre.oval:def:9675
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9675
CopyrightCopyright (C) 2011 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.