CVE-2009-0784
systemtap: race condition leads to privilege escalation
Severity Score
6.3
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Race condition in the SystemTap stap tool 0.0.20080705 and 0.0.20090314 allows local users in the stapusr group to insert arbitrary SystemTap kernel modules and gain privileges via unknown vectors.
Una condición de carrera en la herramienta stap de SystemTap versiones 0.0.20080705 y 0.0.20090314, permite a los usuarios locales del grupo stapusr insertar módulos de kernel de SystemTap arbitrarios y alcanzar privilegios por medio de vectores desconocidos.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2009-03-04 CVE Reserved
- 2009-03-25 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CAPEC
References (10)
URL | Tag | Source |
---|---|---|
http://secunia.com/advisories/34441 | Third Party Advisory | |
http://secunia.com/advisories/34479 | Third Party Advisory | |
http://secunia.com/advisories/34548 | Third Party Advisory | |
http://support.avaya.com/elmodocs2/security/ASA-2009-110.htm | Third Party Advisory | |
http://www.vupen.com/english/advisories/2009/0907 | Third Party Advisory | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11613 | Signature |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.debian.org/security/2009/dsa-1755 | 2020-11-04 |
URL | Date | SRC |
---|---|---|
http://www.redhat.com/support/errata/RHSA-2009-0373.html | 2020-11-04 | |
https://access.redhat.com/security/cve/CVE-2009-0784 | 2009-03-26 | |
https://bugzilla.redhat.com/show_bug.cgi?id=489808 | 2009-03-26 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Systemtap Search vendor "Systemtap" | Systemtap Search vendor "Systemtap" for product "Systemtap" | 0.0.20080705 Search vendor "Systemtap" for product "Systemtap" and version "0.0.20080705" | - |
Affected
| ||||||
Systemtap Search vendor "Systemtap" | Systemtap Search vendor "Systemtap" for product "Systemtap" | 0.0.20090314 Search vendor "Systemtap" for product "Systemtap" and version "0.0.20090314" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 4.0 Search vendor "Debian" for product "Debian Linux" and version "4.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 5.0 Search vendor "Debian" for product "Debian Linux" and version "5.0" | - |
Affected
|