Page 3 of 12 results (0.003 seconds)

CVSS: 1.9EPSS: 0%CPEs: 1EXPL: 1

SystemTap 1.0, when the --unprivileged option is used, does not properly restrict certain data sizes, which allows local users to (1) cause a denial of service or gain privileges via a print operation with a large number of arguments that trigger a kernel stack overflow, (2) cause a denial of service via crafted DWARF expressions that trigger a kernel stack frame overflow, or (3) cause a denial of service (infinite loop) via vectors that trigger creation of large unwind tables, related to Common Information Entry (CIE) and Call Frame Instruction (CFI) records. SystemTap 1.0, cuando se utiliza la opción "--unprivileged", no restringe adecuadamente ciertos tamaños de datos, lo que permite a usuarios locales (1) producir una denegación de servicio o ganar privilegios a través de una operación de impresión con un gran numero de argumentos que inicia un desbordamiento de ka pila del kernel, (2) producir una denegación de servicio a través de expresión DWARF manipuladas que inician un desbordamiento de la pila del kernel, o (3) producir una denegación de servicio (bucle infinito) a través de vectores que inician la creación de grandes tablas relacionadas con las entradas "Entry Common Information" (CIE) y "Call Frame Instruction" (CFI). • http://gcc.gnu.org/bugzilla/show_bug.cgi?id=41633 http://secunia.com/advisories/37167 http://sources.redhat.com/bugzilla/show_bug.cgi?id=10750 http://www.openwall.com/lists/oss-security/2009/10/21/1 http://www.securityfocus.com/bid/36778 http://www.vupen.com/english/advisories/2009/2989 https://bugzilla.redhat.com/show_bug.cgi?id=529175 https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00627.html https://www.redhat.com/archives/fedora-package-anno • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 6.6EPSS: 0%CPEs: 4EXPL: 0

Race condition in the SystemTap stap tool 0.0.20080705 and 0.0.20090314 allows local users in the stapusr group to insert arbitrary SystemTap kernel modules and gain privileges via unknown vectors. Una condición de carrera en la herramienta stap de SystemTap versiones 0.0.20080705 y 0.0.20090314, permite a los usuarios locales del grupo stapusr insertar módulos de kernel de SystemTap arbitrarios y alcanzar privilegios por medio de vectores desconocidos. • http://secunia.com/advisories/34441 http://secunia.com/advisories/34479 http://secunia.com/advisories/34548 http://support.avaya.com/elmodocs2/security/ASA-2009-110.htm http://www.debian.org/security/2009/dsa-1755 http://www.redhat.com/support/errata/RHSA-2009-0373.html http://www.vupen.com/english/advisories/2009/0907 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11613 https://access.redhat.com/security/cve/CVE-2009-0784 https://bug • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •