4.9
CVSSv2

CVE-2010-0411

Published: 08/02/2010 Updated: 13/02/2023
CVSS v2 Base Score: 4.9 | Impact Score: 6.9 | Exploitability Score: 3.9
VMScore: 495
Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

Multiple integer signedness errors in the (1) __get_argv and (2) __get_compat_argv functions in tapset/aux_syscalls.stp in SystemTap 1.1 allow local users to cause a denial of service (script crash, or system crash or hang) via a process with a large number of arguments, leading to a buffer overflow.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

systemtap systemtap 1.1

Vendor Advisories

Debian Bug report logs - #572560 CVE-2010-0412: Inproper restriction of "-B" option Package: systemtap; Maintainer for systemtap is Ritesh Raj Sarraf <rrs@debianorg>; Source for systemtap is src:systemtap (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Thu, 4 Mar 2010 21:24:01 UTC Seve ...
Synopsis Moderate: systemtap security update Type/Severity Security Advisory: Moderate Topic Updated systemtap packages that fix a security issue are now available forRed Hat Enterprise Linux 4This update has been rated as having moderate security impact by the RedHat Security Response Team Descr ...
Synopsis Important: systemtap security update Type/Severity Security Advisory: Important Topic Updated systemtap packages that fix two security issues are now availablefor Red Hat Enterprise Linux 5This update has been rated as having important security impact by the RedHat Security Response Team ...

Exploits

source: wwwsecurityfocuscom/bid/38120/info SystemTap is prone to multiple local memory-corruption vulnerabilities An attacker may exploit these issues to execute arbitrary code with SYSTEM privileges Failed exploit attempts will result in a denial of service SystemTap 11 is vulnerable; other versions may also be affected #!/bin/b ...