Vulnerabilities > CVE-2011-1769 - Numeric Errors vulnerability in Systemtap

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN

Summary

SystemTap 1.4 and earlier, when unprivileged (aka stapusr) mode is enabled, allows local users to cause a denial of service (divide-by-zero error and OOPS) via a crafted ELF program with DWARF expressions that are not properly handled by a stap script that performs context variable access.

Common Weakness Enumeration (CWE)

Nessus

  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2011-0841.NASL
    descriptionUpdated systemtap packages that fix one security issue are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. SystemTap is an instrumentation system for systems running the Linux kernel, version 2.6. Developers can write scripts to collect data on the operation of the system. A divide-by-zero flaw was found in the way SystemTap handled malformed debugging information in DWARF format. When SystemTap unprivileged mode was enabled, an unprivileged user in the stapusr group could use this flaw to crash the system. Additionally, a privileged user (root, or a member of the stapdev group) could trigger this flaw when tricked into instrumenting a specially crafted ELF binary, even when unprivileged mode was not enabled. (CVE-2011-1769) SystemTap users should upgrade to these updated packages, which contain a backported patch to correct this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id67083
    published2013-06-29
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/67083
    titleCentOS 5 : systemtap (CESA-2011:0841)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2011-7289.NASL
    descriptionTwo divide-by-zero flaws were found in the way systemtap interpreted certain corrupted DWARF expressions. A privileged user able to execute arbitrary systemtap scripts could be tricked into triggering this flaw to crash the target machine. An unprivileged user (in the stapusr group) may be able to trigger this flaw to crash the target machine, only if unprivileged mode was enabled by the system administrator. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id54835
    published2011-05-27
    reporterThis script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/54835
    titleFedora 13 : systemtap-1.4-6.fc13 (2011-7289)
  • NASL familyMandriva Local Security Checks
    NASL idMANDRIVA_MDVSA-2011-154.NASL
    descriptionA vulnerability has been discovered and corrected in systemtap : SystemTap 1.4 and earlier, when unprivileged (aka stapusr) mode is enabled, allows local users to cause a denial of service (divide-by-zero error and OOPS) via a crafted ELF program with DWARF expressions that are not properly handled by a stap script that performs context variable access (CVE-2011-1769). The updated packages have been patched to correct this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id56532
    published2011-10-18
    reporterThis script is Copyright (C) 2011-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/56532
    titleMandriva Linux Security Advisory : systemtap (MDVSA-2011:154)
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2011-0842.NASL
    descriptionFrom Red Hat Security Advisory 2011:0842 : Updated systemtap packages that fix two security issues are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. SystemTap is an instrumentation system for systems running the Linux kernel, version 2.6. Developers can write scripts to collect data on the operation of the system. Two divide-by-zero flaws were found in the way SystemTap handled malformed debugging information in DWARF format. When SystemTap unprivileged mode was enabled, an unprivileged user in the stapusr group could use these flaws to crash the system. Additionally, a privileged user (root, or a member of the stapdev group) could trigger these flaws when tricked into instrumenting a specially crafted ELF binary, even when unprivileged mode was not enabled. (CVE-2011-1769, CVE-2011-1781) SystemTap users should upgrade to these updated packages, which contain a backported patch to correct these issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id68282
    published2013-07-12
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/68282
    titleOracle Linux 6 : systemtap (ELSA-2011-0842)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2011-7314.NASL
    descriptionTwo divide-by-zero flaws were found in the way systemtap interpreted certain corrupted DWARF expressions. A privileged user able to execute arbitrary systemtap scripts could be tricked into triggering this flaw to crash the target machine. An unprivileged user (in the stapusr group) may be able to trigger this flaw to crash the target machine, only if unprivileged mode was enabled by the system administrator. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id54837
    published2011-05-27
    reporterThis script is Copyright (C) 2011-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/54837
    titleFedora 15 : systemtap-1.4-9.fc15 (2011-7314)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2011-0841.NASL
    descriptionUpdated systemtap packages that fix one security issue are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. SystemTap is an instrumentation system for systems running the Linux kernel, version 2.6. Developers can write scripts to collect data on the operation of the system. A divide-by-zero flaw was found in the way SystemTap handled malformed debugging information in DWARF format. When SystemTap unprivileged mode was enabled, an unprivileged user in the stapusr group could use this flaw to crash the system. Additionally, a privileged user (root, or a member of the stapdev group) could trigger this flaw when tricked into instrumenting a specially crafted ELF binary, even when unprivileged mode was not enabled. (CVE-2011-1769) SystemTap users should upgrade to these updated packages, which contain a backported patch to correct this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id54929
    published2011-06-01
    reporterThis script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/54929
    titleRHEL 5 : systemtap (RHSA-2011:0841)
  • NASL familyMandriva Local Security Checks
    NASL idMANDRIVA_MDVSA-2011-155.NASL
    descriptionMultiple vulnerabilities has been discovered and corrected in systemtap : SystemTap 1.4 and earlier, when unprivileged (aka stapusr) mode is enabled, allows local users to cause a denial of service (divide-by-zero error and OOPS) via a crafted ELF program with DWARF expressions that are not properly handled by a stap script that performs context variable access (CVE-2011-1769). SystemTap 1.4, when unprivileged (aka stapusr) mode is enabled, allows local users to cause a denial of service (divide-by-zero error and OOPS) via a crafted ELF program with DWARF expressions that are not properly handled by a stap script that performs stack unwinding (aka backtracing) (CVE-2011-1781). The updated packages have been patched to correct these issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id61932
    published2012-09-06
    reporterThis script is Copyright (C) 2012-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/61932
    titleMandriva Linux Security Advisory : systemtap (MDVSA-2011:155)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20110531_SYSTEMTAP_ON_SL5_X.NASL
    descriptionSystemTap is an instrumentation system for systems running the Linux kernel, version 2.6. Developers can write scripts to collect data on the operation of the system. A divide-by-zero flaw was found in the way SystemTap handled malformed debugging information in DWARF format. When SystemTap unprivileged mode was enabled, an unprivileged user in the stapusr group could use this flaw to crash the system. Additionally, a privileged user (root, or a member of the stapdev group) could trigger this flaw when tricked into instrumenting a specially crafted ELF binary, even when unprivileged mode was not enabled. (CVE-2011-1769) SystemTap users should upgrade to these updated packages, which contain a backported patch to correct this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id61061
    published2012-08-01
    reporterThis script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/61061
    titleScientific Linux Security Update : systemtap on SL5.x i386/x86_64
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2011-0842.NASL
    descriptionUpdated systemtap packages that fix two security issues are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. SystemTap is an instrumentation system for systems running the Linux kernel, version 2.6. Developers can write scripts to collect data on the operation of the system. Two divide-by-zero flaws were found in the way SystemTap handled malformed debugging information in DWARF format. When SystemTap unprivileged mode was enabled, an unprivileged user in the stapusr group could use these flaws to crash the system. Additionally, a privileged user (root, or a member of the stapdev group) could trigger these flaws when tricked into instrumenting a specially crafted ELF binary, even when unprivileged mode was not enabled. (CVE-2011-1769, CVE-2011-1781) SystemTap users should upgrade to these updated packages, which contain a backported patch to correct these issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id54930
    published2011-06-01
    reporterThis script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/54930
    titleRHEL 6 : systemtap (RHSA-2011:0842)
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2011-0841.NASL
    descriptionFrom Red Hat Security Advisory 2011:0841 : Updated systemtap packages that fix one security issue are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. SystemTap is an instrumentation system for systems running the Linux kernel, version 2.6. Developers can write scripts to collect data on the operation of the system. A divide-by-zero flaw was found in the way SystemTap handled malformed debugging information in DWARF format. When SystemTap unprivileged mode was enabled, an unprivileged user in the stapusr group could use this flaw to crash the system. Additionally, a privileged user (root, or a member of the stapdev group) could trigger this flaw when tricked into instrumenting a specially crafted ELF binary, even when unprivileged mode was not enabled. (CVE-2011-1769) SystemTap users should upgrade to these updated packages, which contain a backported patch to correct this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id68281
    published2013-07-12
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/68281
    titleOracle Linux 5 : systemtap (ELSA-2011-0841)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20110531_SYSTEMTAP_ON_SL6_X.NASL
    descriptionSystemTap is an instrumentation system for systems running the Linux kernel, version 2.6. Developers can write scripts to collect data on the operation of the system. Two divide-by-zero flaws were found in the way SystemTap handled malformed debugging information in DWARF format. When SystemTap unprivileged mode was enabled, an unprivileged user in the stapusr group could use these flaws to crash the system. Additionally, a privileged user (root, or a member of the stapdev group) could trigger these flaws when tricked into instrumenting a specially crafted ELF binary, even when unprivileged mode was not enabled. (CVE-2011-1769, CVE-2011-1781) SystemTap users should upgrade to these updated packages, which contain a backported patch to correct these issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id61062
    published2012-08-01
    reporterThis script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/61062
    titleScientific Linux Security Update : systemtap on SL6.x i386/x86_64
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2011-7302.NASL
    descriptionTwo divide-by-zero flaws were found in the way systemtap interpreted certain corrupted DWARF expressions. A privileged user able to execute arbitrary systemtap scripts could be tricked into triggering this flaw to crash the target machine. An unprivileged user (in the stapusr group) may be able to trigger this flaw to crash the target machine, only if unprivileged mode was enabled by the system administrator. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id54836
    published2011-05-27
    reporterThis script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/54836
    titleFedora 14 : systemtap-1.4-6.fc14 (2011-7302)

Redhat

advisories
  • bugzilla
    id702687
    titleCVE-2011-1769 systemtap: does not guard against DWARF operations div-by-zero errors, which can cause a kernel panic
    oval
    OR
    • commentRed Hat Enterprise Linux must be installed
      ovaloval:com.redhat.rhba:tst:20070304026
    • AND
      • commentRed Hat Enterprise Linux 5 is installed
        ovaloval:com.redhat.rhba:tst:20070331005
      • OR
        • AND
          • commentsystemtap-client is earlier than 0:1.3-4.el5_6.1
            ovaloval:com.redhat.rhsa:tst:20110841001
          • commentsystemtap-client is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20090373009
        • AND
          • commentsystemtap-sdt-devel is earlier than 0:1.3-4.el5_6.1
            ovaloval:com.redhat.rhsa:tst:20110841003
          • commentsystemtap-sdt-devel is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20100124014
        • AND
          • commentsystemtap-server is earlier than 0:1.3-4.el5_6.1
            ovaloval:com.redhat.rhsa:tst:20110841005
          • commentsystemtap-server is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20090373011
        • AND
          • commentsystemtap-testsuite is earlier than 0:1.3-4.el5_6.1
            ovaloval:com.redhat.rhsa:tst:20110841007
          • commentsystemtap-testsuite is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20090373013
        • AND
          • commentsystemtap-runtime is earlier than 0:1.3-4.el5_6.1
            ovaloval:com.redhat.rhsa:tst:20110841009
          • commentsystemtap-runtime is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20090373015
        • AND
          • commentsystemtap-initscript is earlier than 0:1.3-4.el5_6.1
            ovaloval:com.redhat.rhsa:tst:20110841011
          • commentsystemtap-initscript is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20100124006
        • AND
          • commentsystemtap is earlier than 0:1.3-4.el5_6.1
            ovaloval:com.redhat.rhsa:tst:20110841013
          • commentsystemtap is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20090373017
    rhsa
    idRHSA-2011:0841
    released2011-05-31
    severityModerate
    titleRHSA-2011:0841: systemtap security update (Moderate)
  • rhsa
    idRHSA-2011:0842
rpms
  • systemtap-0:1.3-4.el5_6.1
  • systemtap-client-0:1.3-4.el5_6.1
  • systemtap-debuginfo-0:1.3-4.el5_6.1
  • systemtap-initscript-0:1.3-4.el5_6.1
  • systemtap-runtime-0:1.3-4.el5_6.1
  • systemtap-sdt-devel-0:1.3-4.el5_6.1
  • systemtap-server-0:1.3-4.el5_6.1
  • systemtap-testsuite-0:1.3-4.el5_6.1
  • systemtap-0:1.4-6.el6_1.1
  • systemtap-client-0:1.4-6.el6_1.1
  • systemtap-debuginfo-0:1.4-6.el6_1.1
  • systemtap-grapher-0:1.4-6.el6_1.1
  • systemtap-initscript-0:1.4-6.el6_1.1
  • systemtap-runtime-0:1.4-6.el6_1.1
  • systemtap-sdt-devel-0:1.4-6.el6_1.1
  • systemtap-server-0:1.4-6.el6_1.1
  • systemtap-testsuite-0:1.4-6.el6_1.1