CVE-2010-0411

Multiple integer signedness errors in the (1) __get_argv and (2) __get_compat_argv functions in tapset/aux_syscalls.stp in SystemTap 1.1 allow local users to cause a denial of service (script crash, or system crash or hang) via a process with a large number of arguments, leading to a buffer overflow.
References
Link Resource
http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035201.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035261.html
http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00006.html
http://marc.info/?l=oss-security&m=126530657715364&w=2
http://secunia.com/advisories/38426 Vendor Advisory
http://secunia.com/advisories/38680
http://secunia.com/advisories/38765
http://secunia.com/advisories/38817
http://secunia.com/advisories/39656
http://securitytracker.com/id?1023664
http://sourceware.org/bugzilla/show_bug.cgi?id=11234
http://sourceware.org/git/gitweb.cgi?p=systemtap.git%3Ba=commit%3Bh=a2d399c87a642190f08ede63dc6fc434a5a8363a
http://www.redhat.com/support/errata/RHSA-2010-0124.html
http://www.redhat.com/support/errata/RHSA-2010-0125.html
http://www.securityfocus.com/bid/38120 Exploit
http://www.vupen.com/english/advisories/2010/1001
https://bugzilla.redhat.com/show_bug.cgi?id=559719
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9675
http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035201.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035261.html
http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00006.html
http://marc.info/?l=oss-security&m=126530657715364&w=2
http://secunia.com/advisories/38426 Vendor Advisory
http://secunia.com/advisories/38680
http://secunia.com/advisories/38765
http://secunia.com/advisories/38817
http://secunia.com/advisories/39656
http://securitytracker.com/id?1023664
http://sourceware.org/bugzilla/show_bug.cgi?id=11234
http://sourceware.org/git/gitweb.cgi?p=systemtap.git%3Ba=commit%3Bh=a2d399c87a642190f08ede63dc6fc434a5a8363a
http://www.redhat.com/support/errata/RHSA-2010-0124.html
http://www.redhat.com/support/errata/RHSA-2010-0125.html
http://www.securityfocus.com/bid/38120 Exploit
http://www.vupen.com/english/advisories/2010/1001
https://bugzilla.redhat.com/show_bug.cgi?id=559719
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9675
Configurations

Configuration 1 (hide)

cpe:2.3:a:systemtap:systemtap:1.1:*:*:*:*:*:*:*

History

21 Nov 2024, 01:12

Type Values Removed Values Added
References () http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035201.html - () http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035201.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035261.html - () http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035261.html -
References () http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00006.html - () http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00006.html -
References () http://marc.info/?l=oss-security&m=126530657715364&w=2 - () http://marc.info/?l=oss-security&m=126530657715364&w=2 -
References () http://secunia.com/advisories/38426 - Vendor Advisory () http://secunia.com/advisories/38426 - Vendor Advisory
References () http://secunia.com/advisories/38680 - () http://secunia.com/advisories/38680 -
References () http://secunia.com/advisories/38765 - () http://secunia.com/advisories/38765 -
References () http://secunia.com/advisories/38817 - () http://secunia.com/advisories/38817 -
References () http://secunia.com/advisories/39656 - () http://secunia.com/advisories/39656 -
References () http://securitytracker.com/id?1023664 - () http://securitytracker.com/id?1023664 -
References () http://sourceware.org/bugzilla/show_bug.cgi?id=11234 - () http://sourceware.org/bugzilla/show_bug.cgi?id=11234 -
References () http://sourceware.org/git/gitweb.cgi?p=systemtap.git%3Ba=commit%3Bh=a2d399c87a642190f08ede63dc6fc434a5a8363a - () http://sourceware.org/git/gitweb.cgi?p=systemtap.git%3Ba=commit%3Bh=a2d399c87a642190f08ede63dc6fc434a5a8363a -
References () http://www.redhat.com/support/errata/RHSA-2010-0124.html - () http://www.redhat.com/support/errata/RHSA-2010-0124.html -
References () http://www.redhat.com/support/errata/RHSA-2010-0125.html - () http://www.redhat.com/support/errata/RHSA-2010-0125.html -
References () http://www.securityfocus.com/bid/38120 - Exploit () http://www.securityfocus.com/bid/38120 - Exploit
References () http://www.vupen.com/english/advisories/2010/1001 - () http://www.vupen.com/english/advisories/2010/1001 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=559719 - () https://bugzilla.redhat.com/show_bug.cgi?id=559719 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9675 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9675 -

Information

Published : 2010-02-08 20:30

Updated : 2024-11-21 01:12


NVD link : CVE-2010-0411

Mitre link : CVE-2010-0411

CVE.ORG link : CVE-2010-0411


JSON object : View

Products Affected

systemtap

  • systemtap
CWE
CWE-189

Numeric Errors