1.2
CVSSv2

CVE-2011-1769

Published: 29/08/2011 Updated: 13/02/2023
CVSS v2 Base Score: 1.2 | Impact Score: 2.9 | Exploitability Score: 1.9
VMScore: 107
Vector: AV:L/AC:H/Au:N/C:N/I:N/A:P

Vulnerability Summary

SystemTap 1.4 and previous versions, when unprivileged (aka stapusr) mode is enabled, allows local users to cause a denial of service (divide-by-zero error and OOPS) via a crafted ELF program with DWARF expressions that are not properly handled by a stap script that performs context variable access.

Vulnerable Product Search on Vulmon Subscribe to Product

systemtap systemtap 1.1

systemtap systemtap 1.2

systemtap systemtap 0.3

systemtap systemtap 0.9.5

systemtap systemtap 0.4

systemtap systemtap 0.6.2

systemtap systemtap 0.5.10

systemtap systemtap 0.8

systemtap systemtap 0.9

systemtap systemtap 0.5.14

systemtap systemtap 0.7.2

systemtap systemtap 0.9.8

systemtap systemtap 0.7

systemtap systemtap 0.5.12

systemtap systemtap 0.5.4

systemtap systemtap 0.6

systemtap systemtap 0.5.7

systemtap systemtap 0.9.7

systemtap systemtap 0.9.9

systemtap systemtap 0.5.8

systemtap systemtap 0.5.3

systemtap systemtap 0.2.2

systemtap systemtap 0.5.5

systemtap systemtap 0.5.13

systemtap systemtap 0.5.9

systemtap systemtap

systemtap systemtap 1.0

systemtap systemtap 1.3

systemtap systemtap 0.5

Vendor Advisories

Debian Bug report logs - #628819 systemtap can be used to crash the system Package: systemtap; Maintainer for systemtap is Ritesh Raj Sarraf <rrs@debianorg>; Source for systemtap is src:systemtap (PTS, buildd, popcon) Reported by: "Thijs Kinkhorst" <thijs@debianorg> Date: Wed, 1 Jun 2011 16:00:02 UTC Severity: se ...
Debian Bug report logs - #635542 Two privilege escalation issues (CVE-2011-2502 and CVE-2011-2503) Package: systemtap; Maintainer for systemtap is Ritesh Raj Sarraf <rrs@debianorg>; Source for systemtap is src:systemtap (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Tue, 26 Jul 2011 20: ...