4.4
CVSSv2

CVE-2011-2502

Published: 26/07/2012 Updated: 07/11/2023
CVSS v2 Base Score: 4.4 | Impact Score: 6.4 | Exploitability Score: 3.4
VMScore: 392
Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

runtime/staprun/staprun_funcs.c in the systemtap runtime tool (staprun) in SystemTap prior to 1.6 does not properly validate modules when a module path is specified by a user for user-space probing, which allows local users in the stapusr group to gain privileges via a crafted module in the search path in the -u argument.

Vulnerable Product Search on Vulmon Subscribe to Product

systemtap systemtap 1.1

systemtap systemtap 1.2

systemtap systemtap 0.3

systemtap systemtap 0.9.5

systemtap systemtap 0.4

systemtap systemtap 0.6.2

systemtap systemtap 0.5.10

systemtap systemtap 0.8

systemtap systemtap 0.9

systemtap systemtap 0.5.14

systemtap systemtap 0.7.2

systemtap systemtap 0.9.8

systemtap systemtap 0.7

systemtap systemtap 0.5.12

systemtap systemtap

systemtap systemtap 0.5.4

systemtap systemtap 0.6

systemtap systemtap 0.5.7

systemtap systemtap 0.9.7

systemtap systemtap 1.4

systemtap systemtap 0.9.9

systemtap systemtap 0.5.8

systemtap systemtap 0.5.3

systemtap systemtap 0.2.2

systemtap systemtap 0.5.5

systemtap systemtap 0.5.13

systemtap systemtap 0.5.9

systemtap systemtap 1.0

systemtap systemtap 1.3

systemtap systemtap 0.5

Vendor Advisories

Debian Bug report logs - #628819 systemtap can be used to crash the system Package: systemtap; Maintainer for systemtap is Ritesh Raj Sarraf <rrs@debianorg>; Source for systemtap is src:systemtap (PTS, buildd, popcon) Reported by: "Thijs Kinkhorst" <thijs@debianorg> Date: Wed, 1 Jun 2011 16:00:02 UTC Severity: se ...
Debian Bug report logs - #635542 Two privilege escalation issues (CVE-2011-2502 and CVE-2011-2503) Package: systemtap; Maintainer for systemtap is Ritesh Raj Sarraf <rrs@debianorg>; Source for systemtap is src:systemtap (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Tue, 26 Jul 2011 20: ...