ID CVE-2011-1769
Summary SystemTap 1.4 and earlier, when unprivileged (aka stapusr) mode is enabled, allows local users to cause a denial of service (divide-by-zero error and OOPS) via a crafted ELF program with DWARF expressions that are not properly handled by a stap script that performs context variable access.
References
Vulnerable Configurations
  • cpe:2.3:a:systemtap:systemtap:1.1:*:*:*:*:*:*:*
    cpe:2.3:a:systemtap:systemtap:1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:systemtap:systemtap:1.2:*:*:*:*:*:*:*
    cpe:2.3:a:systemtap:systemtap:1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:systemtap:systemtap:0.3:*:*:*:*:*:*:*
    cpe:2.3:a:systemtap:systemtap:0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:systemtap:systemtap:0.9.5:*:*:*:*:*:*:*
    cpe:2.3:a:systemtap:systemtap:0.9.5:*:*:*:*:*:*:*
  • cpe:2.3:a:systemtap:systemtap:0.4:*:*:*:*:*:*:*
    cpe:2.3:a:systemtap:systemtap:0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:systemtap:systemtap:0.6.2:*:*:*:*:*:*:*
    cpe:2.3:a:systemtap:systemtap:0.6.2:*:*:*:*:*:*:*
  • cpe:2.3:a:systemtap:systemtap:0.5.10:*:*:*:*:*:*:*
    cpe:2.3:a:systemtap:systemtap:0.5.10:*:*:*:*:*:*:*
  • cpe:2.3:a:systemtap:systemtap:0.8:*:*:*:*:*:*:*
    cpe:2.3:a:systemtap:systemtap:0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:systemtap:systemtap:0.9:*:*:*:*:*:*:*
    cpe:2.3:a:systemtap:systemtap:0.9:*:*:*:*:*:*:*
  • cpe:2.3:a:systemtap:systemtap:0.5.14:*:*:*:*:*:*:*
    cpe:2.3:a:systemtap:systemtap:0.5.14:*:*:*:*:*:*:*
  • cpe:2.3:a:systemtap:systemtap:0.7.2:*:*:*:*:*:*:*
    cpe:2.3:a:systemtap:systemtap:0.7.2:*:*:*:*:*:*:*
  • cpe:2.3:a:systemtap:systemtap:0.9.8:*:*:*:*:*:*:*
    cpe:2.3:a:systemtap:systemtap:0.9.8:*:*:*:*:*:*:*
  • cpe:2.3:a:systemtap:systemtap:0.7:*:*:*:*:*:*:*
    cpe:2.3:a:systemtap:systemtap:0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:systemtap:systemtap:0.5.12:*:*:*:*:*:*:*
    cpe:2.3:a:systemtap:systemtap:0.5.12:*:*:*:*:*:*:*
  • cpe:2.3:a:systemtap:systemtap:0.5.4:*:*:*:*:*:*:*
    cpe:2.3:a:systemtap:systemtap:0.5.4:*:*:*:*:*:*:*
  • cpe:2.3:a:systemtap:systemtap:0.6:*:*:*:*:*:*:*
    cpe:2.3:a:systemtap:systemtap:0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:systemtap:systemtap:0.5.7:*:*:*:*:*:*:*
    cpe:2.3:a:systemtap:systemtap:0.5.7:*:*:*:*:*:*:*
  • cpe:2.3:a:systemtap:systemtap:0.9.7:*:*:*:*:*:*:*
    cpe:2.3:a:systemtap:systemtap:0.9.7:*:*:*:*:*:*:*
  • cpe:2.3:a:systemtap:systemtap:0.9.9:*:*:*:*:*:*:*
    cpe:2.3:a:systemtap:systemtap:0.9.9:*:*:*:*:*:*:*
  • cpe:2.3:a:systemtap:systemtap:0.5.8:*:*:*:*:*:*:*
    cpe:2.3:a:systemtap:systemtap:0.5.8:*:*:*:*:*:*:*
  • cpe:2.3:a:systemtap:systemtap:0.5.3:*:*:*:*:*:*:*
    cpe:2.3:a:systemtap:systemtap:0.5.3:*:*:*:*:*:*:*
  • cpe:2.3:a:systemtap:systemtap:0.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:systemtap:systemtap:0.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:systemtap:systemtap:0.5.5:*:*:*:*:*:*:*
    cpe:2.3:a:systemtap:systemtap:0.5.5:*:*:*:*:*:*:*
  • cpe:2.3:a:systemtap:systemtap:0.5.13:*:*:*:*:*:*:*
    cpe:2.3:a:systemtap:systemtap:0.5.13:*:*:*:*:*:*:*
  • cpe:2.3:a:systemtap:systemtap:0.5.9:*:*:*:*:*:*:*
    cpe:2.3:a:systemtap:systemtap:0.5.9:*:*:*:*:*:*:*
  • cpe:2.3:a:systemtap:systemtap:0.0.20080705:*:*:*:*:*:*:*
    cpe:2.3:a:systemtap:systemtap:0.0.20080705:*:*:*:*:*:*:*
  • cpe:2.3:a:systemtap:systemtap:0.0.20090314:*:*:*:*:*:*:*
    cpe:2.3:a:systemtap:systemtap:0.0.20090314:*:*:*:*:*:*:*
  • cpe:2.3:a:systemtap:systemtap:0.5:*:*:*:*:*:*:*
    cpe:2.3:a:systemtap:systemtap:0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:systemtap:systemtap:1.0:*:*:*:*:*:*:*
    cpe:2.3:a:systemtap:systemtap:1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:systemtap:systemtap:1.3:*:*:*:*:*:*:*
    cpe:2.3:a:systemtap:systemtap:1.3:*:*:*:*:*:*:*
  • cpe:2.3:a:systemtap:systemtap:1.4:*:*:*:*:*:*:*
    cpe:2.3:a:systemtap:systemtap:1.4:*:*:*:*:*:*:*
CVSS
Base: 1.2 (as of 13-02-2023 - 04:30)
Impact:
Exploitability:
CWE CWE-189
CAPEC
Access
VectorComplexityAuthentication
LOCAL HIGH NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:L/AC:H/Au:N/C:N/I:N/A:P
redhat via4
advisories
  • bugzilla
    id 702687
    title CVE-2011-1769 systemtap: does not guard against DWARF operations div-by-zero errors, which can cause a kernel panic
    oval
    OR
    • comment Red Hat Enterprise Linux must be installed
      oval oval:com.redhat.rhba:tst:20070304026
    • AND
      • comment Red Hat Enterprise Linux 5 is installed
        oval oval:com.redhat.rhba:tst:20070331005
      • OR
        • AND
          • comment systemtap is earlier than 0:1.3-4.el5_6.1
            oval oval:com.redhat.rhsa:tst:20110841001
          • comment systemtap is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhsa:tst:20090373009
        • AND
          • comment systemtap-client is earlier than 0:1.3-4.el5_6.1
            oval oval:com.redhat.rhsa:tst:20110841003
          • comment systemtap-client is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhsa:tst:20090373011
        • AND
          • comment systemtap-initscript is earlier than 0:1.3-4.el5_6.1
            oval oval:com.redhat.rhsa:tst:20110841005
          • comment systemtap-initscript is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhsa:tst:20100124006
        • AND
          • comment systemtap-runtime is earlier than 0:1.3-4.el5_6.1
            oval oval:com.redhat.rhsa:tst:20110841007
          • comment systemtap-runtime is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhsa:tst:20090373013
        • AND
          • comment systemtap-sdt-devel is earlier than 0:1.3-4.el5_6.1
            oval oval:com.redhat.rhsa:tst:20110841009
          • comment systemtap-sdt-devel is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhsa:tst:20100124010
        • AND
          • comment systemtap-server is earlier than 0:1.3-4.el5_6.1
            oval oval:com.redhat.rhsa:tst:20110841011
          • comment systemtap-server is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhsa:tst:20090373015
        • AND
          • comment systemtap-testsuite is earlier than 0:1.3-4.el5_6.1
            oval oval:com.redhat.rhsa:tst:20110841013
          • comment systemtap-testsuite is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhsa:tst:20090373017
    rhsa
    id RHSA-2011:0841
    released 2011-05-31
    severity Moderate
    title RHSA-2011:0841: systemtap security update (Moderate)
  • rhsa
    id RHSA-2011:0842
rpms
  • systemtap-0:1.3-4.el5_6.1
  • systemtap-client-0:1.3-4.el5_6.1
  • systemtap-debuginfo-0:1.3-4.el5_6.1
  • systemtap-initscript-0:1.3-4.el5_6.1
  • systemtap-runtime-0:1.3-4.el5_6.1
  • systemtap-sdt-devel-0:1.3-4.el5_6.1
  • systemtap-server-0:1.3-4.el5_6.1
  • systemtap-testsuite-0:1.3-4.el5_6.1
  • systemtap-0:1.4-6.el6_1.1
  • systemtap-client-0:1.4-6.el6_1.1
  • systemtap-debuginfo-0:1.4-6.el6_1.1
  • systemtap-grapher-0:1.4-6.el6_1.1
  • systemtap-initscript-0:1.4-6.el6_1.1
  • systemtap-runtime-0:1.4-6.el6_1.1
  • systemtap-sdt-devel-0:1.4-6.el6_1.1
  • systemtap-server-0:1.4-6.el6_1.1
  • systemtap-testsuite-0:1.4-6.el6_1.1
refmap via4
bid 47934
confirm
mandriva
  • MDVSA-2011:154
  • MDVSA-2011:155
mlist [oss-security] 20110520 systemtap divide-by-zero issues (CVE-2011-1769, CVE-2011-1781)
secunia 44802
Last major update 13-02-2023 - 04:30
Published 29-08-2011 - 21:55
Last modified 13-02-2023 - 04:30
Back to Top