CVE-2009-4273

stap-server in SystemTap before 1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in stap command-line arguments in a request.
References
Link Resource
http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035201.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035261.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-January/034036.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-January/034041.html Patch
http://lists.fedoraproject.org/pipermail/scm-commits/2010-February/394714.html
http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00006.html
http://secunia.com/advisories/38154 Vendor Advisory
http://secunia.com/advisories/38216 Vendor Advisory
http://secunia.com/advisories/38765
http://secunia.com/advisories/39656
http://sourceware.org/bugzilla/show_bug.cgi?id=11105
http://sourceware.org/ml/systemtap/2010-q1/msg00142.html
http://sourceware.org/systemtap/ftp/releases/systemtap-1.1.tar.gz Patch
http://www.redhat.com/support/errata/RHSA-2010-0124.html
http://www.vupen.com/english/advisories/2010/0169 Vendor Advisory
http://www.vupen.com/english/advisories/2010/1001
https://bugzilla.redhat.com/show_bug.cgi?id=550172
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11417
http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035201.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035261.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-January/034036.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-January/034041.html Patch
http://lists.fedoraproject.org/pipermail/scm-commits/2010-February/394714.html
http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00006.html
http://secunia.com/advisories/38154 Vendor Advisory
http://secunia.com/advisories/38216 Vendor Advisory
http://secunia.com/advisories/38765
http://secunia.com/advisories/39656
http://sourceware.org/bugzilla/show_bug.cgi?id=11105
http://sourceware.org/ml/systemtap/2010-q1/msg00142.html
http://sourceware.org/systemtap/ftp/releases/systemtap-1.1.tar.gz Patch
http://www.redhat.com/support/errata/RHSA-2010-0124.html
http://www.vupen.com/english/advisories/2010/0169 Vendor Advisory
http://www.vupen.com/english/advisories/2010/1001
https://bugzilla.redhat.com/show_bug.cgi?id=550172
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11417
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:systemtap:systemtap:*:*:*:*:*:*:*:*
cpe:2.3:a:systemtap:systemtap:0.2.2:*:*:*:*:*:*:*
cpe:2.3:a:systemtap:systemtap:0.3:*:*:*:*:*:*:*
cpe:2.3:a:systemtap:systemtap:0.4:*:*:*:*:*:*:*
cpe:2.3:a:systemtap:systemtap:0.5:*:*:*:*:*:*:*
cpe:2.3:a:systemtap:systemtap:0.5.3:*:*:*:*:*:*:*
cpe:2.3:a:systemtap:systemtap:0.5.4:*:*:*:*:*:*:*
cpe:2.3:a:systemtap:systemtap:0.5.5:*:*:*:*:*:*:*
cpe:2.3:a:systemtap:systemtap:0.5.7:*:*:*:*:*:*:*
cpe:2.3:a:systemtap:systemtap:0.5.8:*:*:*:*:*:*:*
cpe:2.3:a:systemtap:systemtap:0.5.9:*:*:*:*:*:*:*
cpe:2.3:a:systemtap:systemtap:0.5.10:*:*:*:*:*:*:*
cpe:2.3:a:systemtap:systemtap:0.5.12:*:*:*:*:*:*:*
cpe:2.3:a:systemtap:systemtap:0.5.13:*:*:*:*:*:*:*
cpe:2.3:a:systemtap:systemtap:0.5.14:*:*:*:*:*:*:*
cpe:2.3:a:systemtap:systemtap:0.6:*:*:*:*:*:*:*
cpe:2.3:a:systemtap:systemtap:0.6.2:*:*:*:*:*:*:*
cpe:2.3:a:systemtap:systemtap:0.7:*:*:*:*:*:*:*
cpe:2.3:a:systemtap:systemtap:0.7.2:*:*:*:*:*:*:*
cpe:2.3:a:systemtap:systemtap:0.8:*:*:*:*:*:*:*
cpe:2.3:a:systemtap:systemtap:0.9:*:*:*:*:*:*:*
cpe:2.3:a:systemtap:systemtap:0.9.5:*:*:*:*:*:*:*
cpe:2.3:a:systemtap:systemtap:0.9.7:*:*:*:*:*:*:*
cpe:2.3:a:systemtap:systemtap:0.9.8:*:*:*:*:*:*:*
cpe:2.3:a:systemtap:systemtap:0.9.9:*:*:*:*:*:*:*

History

21 Nov 2024, 01:09

Type Values Removed Values Added
References () http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035201.html - () http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035201.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035261.html - () http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035261.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2010-January/034036.html - () http://lists.fedoraproject.org/pipermail/package-announce/2010-January/034036.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2010-January/034041.html - Patch () http://lists.fedoraproject.org/pipermail/package-announce/2010-January/034041.html - Patch
References () http://lists.fedoraproject.org/pipermail/scm-commits/2010-February/394714.html - () http://lists.fedoraproject.org/pipermail/scm-commits/2010-February/394714.html -
References () http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00006.html - () http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00006.html -
References () http://secunia.com/advisories/38154 - Vendor Advisory () http://secunia.com/advisories/38154 - Vendor Advisory
References () http://secunia.com/advisories/38216 - Vendor Advisory () http://secunia.com/advisories/38216 - Vendor Advisory
References () http://secunia.com/advisories/38765 - () http://secunia.com/advisories/38765 -
References () http://secunia.com/advisories/39656 - () http://secunia.com/advisories/39656 -
References () http://sourceware.org/bugzilla/show_bug.cgi?id=11105 - () http://sourceware.org/bugzilla/show_bug.cgi?id=11105 -
References () http://sourceware.org/ml/systemtap/2010-q1/msg00142.html - () http://sourceware.org/ml/systemtap/2010-q1/msg00142.html -
References () http://sourceware.org/systemtap/ftp/releases/systemtap-1.1.tar.gz - Patch () http://sourceware.org/systemtap/ftp/releases/systemtap-1.1.tar.gz - Patch
References () http://www.redhat.com/support/errata/RHSA-2010-0124.html - () http://www.redhat.com/support/errata/RHSA-2010-0124.html -
References () http://www.vupen.com/english/advisories/2010/0169 - Vendor Advisory () http://www.vupen.com/english/advisories/2010/0169 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2010/1001 - () http://www.vupen.com/english/advisories/2010/1001 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=550172 - () https://bugzilla.redhat.com/show_bug.cgi?id=550172 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11417 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11417 -

Information

Published : 2010-01-26 18:30

Updated : 2024-11-21 01:09


NVD link : CVE-2009-4273

Mitre link : CVE-2009-4273

CVE.ORG link : CVE-2009-4273


JSON object : View

Products Affected

systemtap

  • systemtap
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')