mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
240 lines
9.1 KiB
JSON
240 lines
9.1 KiB
JSON
{
|
|
"id": "CVE-2011-2502",
|
|
"sourceIdentifier": "secalert@redhat.com",
|
|
"published": "2012-07-26T19:55:00.700",
|
|
"lastModified": "2023-11-07T02:07:42.190",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "runtime/staprun/staprun_funcs.c in the systemtap runtime tool (staprun) in SystemTap before 1.6 does not properly validate modules when a module path is specified by a user for user-space probing, which allows local users in the stapusr group to gain privileges via a crafted module in the search path in the -u argument."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "runtime/staprun/staprun_funcs.c en la herramienta de tiempo de ejecuci\u00f3n systemtap (staprun) en SystemTap antes de v1.6 no valida correctamente los m\u00f3dulos cuando una ruta del m\u00f3dulo es especificada por un usuario para probar el espacio de usuario, lo que permite obtener privilegios a usuarios locales en el grupo stapusr a trav\u00e9s de un m\u00f3dulo dise\u00f1ado para tal fin en la ruta de b\u00fasqueda con el argumento -u.\r\n"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
|
|
"accessVector": "LOCAL",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 4.4
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 3.4,
|
|
"impactScore": 6.4,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-20"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:systemtap:systemtap:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "1.5",
|
|
"matchCriteriaId": "44665B6E-F588-42BD-9901-268D4DD93BAF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:systemtap:systemtap:0.2.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "04AE85B6-FE8D-4DD1-BECE-6B7146CF9D73"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:systemtap:systemtap:0.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E150AE05-60B4-4ECE-AEFA-3A230DAEBCA5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:systemtap:systemtap:0.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "36FBF185-3189-40C2-B51B-2531F2D88602"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:systemtap:systemtap:0.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C62AFF32-856E-4EF9-A87F-C06B6FEEE31F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:systemtap:systemtap:0.5.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "57C746CB-8DFE-4795-931F-42050D7FBEB4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:systemtap:systemtap:0.5.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "986B653D-5CF2-454C-A38F-172D2256E20C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:systemtap:systemtap:0.5.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AF5E8C63-D68F-4ACA-B0DC-1D9EF6A3BFA3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:systemtap:systemtap:0.5.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BD56E555-180D-45C3-9311-EFB32F480035"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:systemtap:systemtap:0.5.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "74215553-AB86-4184-B3AB-D82B20275ED6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:systemtap:systemtap:0.5.9:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5044754F-66CD-4D17-8874-7303D9F2DCE2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:systemtap:systemtap:0.5.10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DC674046-FC4F-4262-8F71-4DEECAEC1A1C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:systemtap:systemtap:0.5.12:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7A621722-6DD4-461D-AD74-461B9C10C772"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:systemtap:systemtap:0.5.13:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9B5B77E9-F98C-4310-8D6A-E41A27CD559A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:systemtap:systemtap:0.5.14:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B6E9824F-8977-4CE6-BA05-E8899E41066E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:systemtap:systemtap:0.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FF58A998-52F0-4BCA-9FF7-FCCC28E6FCE1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:systemtap:systemtap:0.6.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C2327CA9-5A80-4C86-BAF6-A9E3BB7085C6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:systemtap:systemtap:0.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6627D143-6E8D-40DE-BBD0-308FF1B200D6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:systemtap:systemtap:0.7.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A1AE49CA-424E-4328-A348-98F2C847D8FC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:systemtap:systemtap:0.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "19E88BF9-1403-40F9-A64E-A1FEFEFC4E2D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:systemtap:systemtap:0.9:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3E12D5C4-4BC6-4802-B5CE-5D5A41FB3B71"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:systemtap:systemtap:0.9.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6FD4201A-64B5-4DCC-9696-BD0F8780D200"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:systemtap:systemtap:0.9.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C3FEDD7F-969D-422C-A899-9550EC52EBD7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:systemtap:systemtap:0.9.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F37EBCB6-8056-466C-B2AB-385DF48EEA8F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:systemtap:systemtap:0.9.9:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0D795EA7-04FC-4D0E-9944-6C9D4882A897"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:systemtap:systemtap:1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7C36C437-D28D-452A-BAF0-4A618A61920B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:systemtap:systemtap:1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5AB898A5-C8EF-4BBA-B480-00461218FC3B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:systemtap:systemtap:1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D06D7E42-666F-43CE-8BE3-0EE915450CC0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:systemtap:systemtap:1.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3D031679-0C77-4645-B488-DA29BB81FA39"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:systemtap:systemtap:1.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CE5CA99B-6DED-4395-BFE0-C8DB7F504AF0"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://secunia.com/advisories/45377",
|
|
"source": "secalert@redhat.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://sources.redhat.com/git/gitweb.cgi?p=systemtap.git%3Ba=blob%3Bf=NEWS%3Bhb=304d73b1fea24af791f2a129fb141c5009eae6a8",
|
|
"source": "secalert@redhat.com"
|
|
},
|
|
{
|
|
"url": "http://sources.redhat.com/git/gitweb.cgi?p=systemtap.git%3Ba=commitdiff%3Bh=4ecaadf545a729bb3e5f01f6f019716d49815d9a",
|
|
"source": "secalert@redhat.com"
|
|
},
|
|
{
|
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=716476",
|
|
"source": "secalert@redhat.com"
|
|
}
|
|
]
|
|
} |