CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
2.9 | $0-$5k | 0.00 |
A vulnerability was found in SystemTap 1.4 and classified as problematic. Affected by this issue is an unknown code block. The manipulation with an unknown input leads to a numeric error vulnerability. Using CWE to declare the problem leads to CWE-189. Impacted is availability. CVE summarizes:
SystemTap 1.4, when unprivileged (aka stapusr) mode is enabled, allows local users to cause a denial of service (divide-by-zero error and OOPS) via a crafted ELF program with DWARF expressions that are not properly handled by a stap script that performs stack unwinding (aka backtracing).
The weakness was released 08/29/2011 (Website). The advisory is available at rhn.redhat.com. This vulnerability is handled as CVE-2011-1781 since 04/19/2011. The exploitation is known to be difficult. Local access is required to approach this attack. No form of authentication is required for exploitation. The technical details are unknown and an exploit is not available.
The vulnerability scanner Nessus provides a plugin with the ID 67083 (CentOS 5 : systemtap (CESA-2011:0841)), which helps to determine the existence of the flaw in a target environment. It is assigned to the family CentOS Local Security Checks. The commercial vulnerability scanner Qualys is able to test this issue with plugin 155535 (Oracle Enterprise Linux Update for SystemTap (ELSA-2011-0842)).
There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
The vulnerability is also documented in the databases at X-Force (67568) and Tenable (67083). Entry connected to this vulnerability is available at 58405.
Product
Name
Version
CPE 2.3
CPE 2.2
CVSSv4
VulDB CVSS-B Score: 🔍VulDB CVSS-BT Score: 🔍
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 2.9VulDB Meta Temp Score: 2.9
VulDB Base Score: 2.9
VulDB Temp Score: 2.9
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Numeric errorCWE: CWE-189
ATT&CK: Unknown
Local: Yes
Remote: No
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Nessus ID: 67083
Nessus Name: CentOS 5 : systemtap (CESA-2011:0841)
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
OpenVAS ID: 863106
OpenVAS Name: Fedora Update for systemtap FEDORA-2011-7289
OpenVAS File: 🔍
OpenVAS Family: 🔍
Qualys ID: 🔍
Qualys Name: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: no mitigation knownStatus: 🔍
0-Day Time: 🔍
Patch: fa2e3415185a28542d419a641ecd6cddd52e3cd9
Timeline
04/19/2011 🔍05/20/2011 🔍
05/20/2011 🔍
06/01/2011 🔍
06/01/2011 🔍
08/29/2011 🔍
08/29/2011 🔍
03/23/2015 🔍
11/18/2021 🔍
Sources
Advisory: RHSA-2011:0841Status: Not defined
Confirmation: 🔍
CVE: CVE-2011-1781 (🔍)
OVAL: 🔍
X-Force: 67568
Vulnerability Center: 31610 - SystemTap 1.0 through 1.4 Compute_expr() Division by Zero Error Allows Local Denial of Service, Medium
SecurityFocus: 47934 - SystemTap DWARF Expression Handling Two Divide-By-Zero Denial of Service Vulnerabilities
Secunia: 44802 - Red Hat update for systemtap, Not Critical
See also: 🔍
Entry
Created: 03/23/2015 16:50Updated: 11/18/2021 14:26
Changes: 03/23/2015 16:50 (59), 03/23/2017 07:43 (13), 11/18/2021 14:24 (5), 11/18/2021 14:26 (2)
Complete: 🔍
No comments yet. Languages: en.
Please log in to comment.