Vulnerabilities > CVE-2011-1781 - Numeric Errors vulnerability in Systemtap 1.4

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN

Summary

SystemTap 1.4, when unprivileged (aka stapusr) mode is enabled, allows local users to cause a denial of service (divide-by-zero error and OOPS) via a crafted ELF program with DWARF expressions that are not properly handled by a stap script that performs stack unwinding (aka backtracing).

Vulnerable Configurations

Part Description Count
Application
Systemtap
1

Common Weakness Enumeration (CWE)

Nessus

  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2011-0841.NASL
    descriptionUpdated systemtap packages that fix one security issue are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. SystemTap is an instrumentation system for systems running the Linux kernel, version 2.6. Developers can write scripts to collect data on the operation of the system. A divide-by-zero flaw was found in the way SystemTap handled malformed debugging information in DWARF format. When SystemTap unprivileged mode was enabled, an unprivileged user in the stapusr group could use this flaw to crash the system. Additionally, a privileged user (root, or a member of the stapdev group) could trigger this flaw when tricked into instrumenting a specially crafted ELF binary, even when unprivileged mode was not enabled. (CVE-2011-1769) SystemTap users should upgrade to these updated packages, which contain a backported patch to correct this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id67083
    published2013-06-29
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/67083
    titleCentOS 5 : systemtap (CESA-2011:0841)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2011-7289.NASL
    descriptionTwo divide-by-zero flaws were found in the way systemtap interpreted certain corrupted DWARF expressions. A privileged user able to execute arbitrary systemtap scripts could be tricked into triggering this flaw to crash the target machine. An unprivileged user (in the stapusr group) may be able to trigger this flaw to crash the target machine, only if unprivileged mode was enabled by the system administrator. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id54835
    published2011-05-27
    reporterThis script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/54835
    titleFedora 13 : systemtap-1.4-6.fc13 (2011-7289)
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2011-0842.NASL
    descriptionFrom Red Hat Security Advisory 2011:0842 : Updated systemtap packages that fix two security issues are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. SystemTap is an instrumentation system for systems running the Linux kernel, version 2.6. Developers can write scripts to collect data on the operation of the system. Two divide-by-zero flaws were found in the way SystemTap handled malformed debugging information in DWARF format. When SystemTap unprivileged mode was enabled, an unprivileged user in the stapusr group could use these flaws to crash the system. Additionally, a privileged user (root, or a member of the stapdev group) could trigger these flaws when tricked into instrumenting a specially crafted ELF binary, even when unprivileged mode was not enabled. (CVE-2011-1769, CVE-2011-1781) SystemTap users should upgrade to these updated packages, which contain a backported patch to correct these issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id68282
    published2013-07-12
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/68282
    titleOracle Linux 6 : systemtap (ELSA-2011-0842)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2011-7314.NASL
    descriptionTwo divide-by-zero flaws were found in the way systemtap interpreted certain corrupted DWARF expressions. A privileged user able to execute arbitrary systemtap scripts could be tricked into triggering this flaw to crash the target machine. An unprivileged user (in the stapusr group) may be able to trigger this flaw to crash the target machine, only if unprivileged mode was enabled by the system administrator. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id54837
    published2011-05-27
    reporterThis script is Copyright (C) 2011-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/54837
    titleFedora 15 : systemtap-1.4-9.fc15 (2011-7314)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2011-0841.NASL
    descriptionUpdated systemtap packages that fix one security issue are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. SystemTap is an instrumentation system for systems running the Linux kernel, version 2.6. Developers can write scripts to collect data on the operation of the system. A divide-by-zero flaw was found in the way SystemTap handled malformed debugging information in DWARF format. When SystemTap unprivileged mode was enabled, an unprivileged user in the stapusr group could use this flaw to crash the system. Additionally, a privileged user (root, or a member of the stapdev group) could trigger this flaw when tricked into instrumenting a specially crafted ELF binary, even when unprivileged mode was not enabled. (CVE-2011-1769) SystemTap users should upgrade to these updated packages, which contain a backported patch to correct this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id54929
    published2011-06-01
    reporterThis script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/54929
    titleRHEL 5 : systemtap (RHSA-2011:0841)
  • NASL familyMandriva Local Security Checks
    NASL idMANDRIVA_MDVSA-2011-155.NASL
    descriptionMultiple vulnerabilities has been discovered and corrected in systemtap : SystemTap 1.4 and earlier, when unprivileged (aka stapusr) mode is enabled, allows local users to cause a denial of service (divide-by-zero error and OOPS) via a crafted ELF program with DWARF expressions that are not properly handled by a stap script that performs context variable access (CVE-2011-1769). SystemTap 1.4, when unprivileged (aka stapusr) mode is enabled, allows local users to cause a denial of service (divide-by-zero error and OOPS) via a crafted ELF program with DWARF expressions that are not properly handled by a stap script that performs stack unwinding (aka backtracing) (CVE-2011-1781). The updated packages have been patched to correct these issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id61932
    published2012-09-06
    reporterThis script is Copyright (C) 2012-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/61932
    titleMandriva Linux Security Advisory : systemtap (MDVSA-2011:155)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2011-0842.NASL
    descriptionUpdated systemtap packages that fix two security issues are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. SystemTap is an instrumentation system for systems running the Linux kernel, version 2.6. Developers can write scripts to collect data on the operation of the system. Two divide-by-zero flaws were found in the way SystemTap handled malformed debugging information in DWARF format. When SystemTap unprivileged mode was enabled, an unprivileged user in the stapusr group could use these flaws to crash the system. Additionally, a privileged user (root, or a member of the stapdev group) could trigger these flaws when tricked into instrumenting a specially crafted ELF binary, even when unprivileged mode was not enabled. (CVE-2011-1769, CVE-2011-1781) SystemTap users should upgrade to these updated packages, which contain a backported patch to correct these issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id54930
    published2011-06-01
    reporterThis script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/54930
    titleRHEL 6 : systemtap (RHSA-2011:0842)
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2011-0841.NASL
    descriptionFrom Red Hat Security Advisory 2011:0841 : Updated systemtap packages that fix one security issue are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. SystemTap is an instrumentation system for systems running the Linux kernel, version 2.6. Developers can write scripts to collect data on the operation of the system. A divide-by-zero flaw was found in the way SystemTap handled malformed debugging information in DWARF format. When SystemTap unprivileged mode was enabled, an unprivileged user in the stapusr group could use this flaw to crash the system. Additionally, a privileged user (root, or a member of the stapdev group) could trigger this flaw when tricked into instrumenting a specially crafted ELF binary, even when unprivileged mode was not enabled. (CVE-2011-1769) SystemTap users should upgrade to these updated packages, which contain a backported patch to correct this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id68281
    published2013-07-12
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/68281
    titleOracle Linux 5 : systemtap (ELSA-2011-0841)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20110531_SYSTEMTAP_ON_SL6_X.NASL
    descriptionSystemTap is an instrumentation system for systems running the Linux kernel, version 2.6. Developers can write scripts to collect data on the operation of the system. Two divide-by-zero flaws were found in the way SystemTap handled malformed debugging information in DWARF format. When SystemTap unprivileged mode was enabled, an unprivileged user in the stapusr group could use these flaws to crash the system. Additionally, a privileged user (root, or a member of the stapdev group) could trigger these flaws when tricked into instrumenting a specially crafted ELF binary, even when unprivileged mode was not enabled. (CVE-2011-1769, CVE-2011-1781) SystemTap users should upgrade to these updated packages, which contain a backported patch to correct these issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id61062
    published2012-08-01
    reporterThis script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/61062
    titleScientific Linux Security Update : systemtap on SL6.x i386/x86_64
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2011-7302.NASL
    descriptionTwo divide-by-zero flaws were found in the way systemtap interpreted certain corrupted DWARF expressions. A privileged user able to execute arbitrary systemtap scripts could be tricked into triggering this flaw to crash the target machine. An unprivileged user (in the stapusr group) may be able to trigger this flaw to crash the target machine, only if unprivileged mode was enabled by the system administrator. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id54836
    published2011-05-27
    reporterThis script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/54836
    titleFedora 14 : systemtap-1.4-6.fc14 (2011-7302)

Redhat

advisories
bugzilla
id703972
titleCVE-2011-1781 systemtap: divide by zero stack unwinding flaw
oval
OR
  • commentRed Hat Enterprise Linux must be installed
    ovaloval:com.redhat.rhba:tst:20070304026
  • AND
    • commentRed Hat Enterprise Linux 6 is installed
      ovaloval:com.redhat.rhba:tst:20111656003
    • OR
      • AND
        • commentsystemtap-sdt-devel is earlier than 0:1.4-6.el6_1.1
          ovaloval:com.redhat.rhsa:tst:20110842001
        • commentsystemtap-sdt-devel is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhsa:tst:20100894002
      • AND
        • commentsystemtap-server is earlier than 0:1.4-6.el6_1.1
          ovaloval:com.redhat.rhsa:tst:20110842003
        • commentsystemtap-server is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhsa:tst:20100894004
      • AND
        • commentsystemtap-grapher is earlier than 0:1.4-6.el6_1.1
          ovaloval:com.redhat.rhsa:tst:20110842005
        • commentsystemtap-grapher is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhsa:tst:20100894008
      • AND
        • commentsystemtap-testsuite is earlier than 0:1.4-6.el6_1.1
          ovaloval:com.redhat.rhsa:tst:20110842007
        • commentsystemtap-testsuite is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhsa:tst:20100894006
      • AND
        • commentsystemtap-runtime is earlier than 0:1.4-6.el6_1.1
          ovaloval:com.redhat.rhsa:tst:20110842009
        • commentsystemtap-runtime is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhsa:tst:20100894016
      • AND
        • commentsystemtap-initscript is earlier than 0:1.4-6.el6_1.1
          ovaloval:com.redhat.rhsa:tst:20110842011
        • commentsystemtap-initscript is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhsa:tst:20100894012
      • AND
        • commentsystemtap-client is earlier than 0:1.4-6.el6_1.1
          ovaloval:com.redhat.rhsa:tst:20110842013
        • commentsystemtap-client is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhsa:tst:20100894010
      • AND
        • commentsystemtap is earlier than 0:1.4-6.el6_1.1
          ovaloval:com.redhat.rhsa:tst:20110842015
        • commentsystemtap is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhsa:tst:20100894014
rhsa
idRHSA-2011:0842
released2011-05-31
severityModerate
titleRHSA-2011:0842: systemtap security update (Moderate)
rpms
  • systemtap-0:1.4-6.el6_1.1
  • systemtap-client-0:1.4-6.el6_1.1
  • systemtap-debuginfo-0:1.4-6.el6_1.1
  • systemtap-grapher-0:1.4-6.el6_1.1
  • systemtap-initscript-0:1.4-6.el6_1.1
  • systemtap-runtime-0:1.4-6.el6_1.1
  • systemtap-sdt-devel-0:1.4-6.el6_1.1
  • systemtap-server-0:1.4-6.el6_1.1
  • systemtap-testsuite-0:1.4-6.el6_1.1