10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
systemtap is vulnerable to arbitrary code execution. The vulnerability exists as a flaw was found in the SystemTap compile server, stap-server, an optional component of SystemTap. This server did not adequately sanitize input provided by the stap-client program, which may allow a remote user to execute arbitrary shell code with the privileges of the compile server process, which could possibly be running as the root user.
lists.fedoraproject.org/pipermail/package-announce/2010-February/035201.html
lists.fedoraproject.org/pipermail/package-announce/2010-February/035261.html
lists.fedoraproject.org/pipermail/package-announce/2010-January/034036.html
lists.fedoraproject.org/pipermail/package-announce/2010-January/034041.html
lists.fedoraproject.org/pipermail/scm-commits/2010-February/394714.html
lists.opensuse.org/opensuse-security-announce/2010-04/msg00006.html
secunia.com/advisories/38154
secunia.com/advisories/38216
secunia.com/advisories/38765
secunia.com/advisories/39656
sourceware.org/bugzilla/show_bug.cgi?id=11105
sourceware.org/ml/systemtap/2010-q1/msg00142.html
sourceware.org/systemtap/ftp/releases/systemtap-1.1.tar.gz
www.redhat.com/security/updates/classification/#important
www.redhat.com/support/errata/RHSA-2010-0124.html
www.vupen.com/english/advisories/2010/0169
www.vupen.com/english/advisories/2010/1001
access.redhat.com/errata/RHSA-2010:0124
access.redhat.com/security/cve/CVE-2009-4273
bugzilla.redhat.com/show_bug.cgi?id=550172
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11417