CVE-2010-4170

The staprun runtime tool in SystemTap 1.3 does not properly clear the environment before executing modprobe, which allows local users to gain privileges by setting the MODPROBE_OPTIONS environment variable to specify a malicious configuration file.
References
Link Resource
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051115.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051122.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051127.html
http://packetstormsecurity.com/files/152569/SystemTap-1.3-MODPROBE_OPTIONS-Privilege-Escalation.html
http://secunia.com/advisories/42256 Vendor Advisory
http://secunia.com/advisories/42263 Vendor Advisory
http://secunia.com/advisories/42306 Vendor Advisory
http://secunia.com/advisories/42318 Vendor Advisory
http://secunia.com/advisories/46920
http://sources.redhat.com/git/gitweb.cgi?p=systemtap.git%3Ba=commit%3Bh=b7565b41228bea196cefa3a7d43ab67f8f9152e2
http://sources.redhat.com/ml/systemtap/2010-q4/msg00230.html
http://www.debian.org/security/2011/dsa-2348
http://www.exploit-db.com/exploits/15620 Exploit
http://www.redhat.com/support/errata/RHSA-2010-0894.html
http://www.redhat.com/support/errata/RHSA-2010-0895.html
http://www.securityfocus.com/bid/44914 Exploit
http://www.securitytracker.com/id?1024754
https://exchange.xforce.ibmcloud.com/vulnerabilities/63344
https://www.exploit-db.com/exploits/46730/
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051115.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051122.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051127.html
http://packetstormsecurity.com/files/152569/SystemTap-1.3-MODPROBE_OPTIONS-Privilege-Escalation.html
http://secunia.com/advisories/42256 Vendor Advisory
http://secunia.com/advisories/42263 Vendor Advisory
http://secunia.com/advisories/42306 Vendor Advisory
http://secunia.com/advisories/42318 Vendor Advisory
http://secunia.com/advisories/46920
http://sources.redhat.com/git/gitweb.cgi?p=systemtap.git%3Ba=commit%3Bh=b7565b41228bea196cefa3a7d43ab67f8f9152e2
http://sources.redhat.com/ml/systemtap/2010-q4/msg00230.html
http://www.debian.org/security/2011/dsa-2348
http://www.exploit-db.com/exploits/15620 Exploit
http://www.redhat.com/support/errata/RHSA-2010-0894.html
http://www.redhat.com/support/errata/RHSA-2010-0895.html
http://www.securityfocus.com/bid/44914 Exploit
http://www.securitytracker.com/id?1024754
https://exchange.xforce.ibmcloud.com/vulnerabilities/63344
https://www.exploit-db.com/exploits/46730/
Configurations

Configuration 1 (hide)

cpe:2.3:a:systemtap:systemtap:1.3:*:*:*:*:*:*:*

History

21 Nov 2024, 01:20

Type Values Removed Values Added
References () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051115.html - () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051115.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051122.html - () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051122.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051127.html - () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051127.html -
References () http://packetstormsecurity.com/files/152569/SystemTap-1.3-MODPROBE_OPTIONS-Privilege-Escalation.html - () http://packetstormsecurity.com/files/152569/SystemTap-1.3-MODPROBE_OPTIONS-Privilege-Escalation.html -
References () http://secunia.com/advisories/42256 - Vendor Advisory () http://secunia.com/advisories/42256 - Vendor Advisory
References () http://secunia.com/advisories/42263 - Vendor Advisory () http://secunia.com/advisories/42263 - Vendor Advisory
References () http://secunia.com/advisories/42306 - Vendor Advisory () http://secunia.com/advisories/42306 - Vendor Advisory
References () http://secunia.com/advisories/42318 - Vendor Advisory () http://secunia.com/advisories/42318 - Vendor Advisory
References () http://secunia.com/advisories/46920 - () http://secunia.com/advisories/46920 -
References () http://sources.redhat.com/git/gitweb.cgi?p=systemtap.git%3Ba=commit%3Bh=b7565b41228bea196cefa3a7d43ab67f8f9152e2 - () http://sources.redhat.com/git/gitweb.cgi?p=systemtap.git%3Ba=commit%3Bh=b7565b41228bea196cefa3a7d43ab67f8f9152e2 -
References () http://sources.redhat.com/ml/systemtap/2010-q4/msg00230.html - () http://sources.redhat.com/ml/systemtap/2010-q4/msg00230.html -
References () http://www.debian.org/security/2011/dsa-2348 - () http://www.debian.org/security/2011/dsa-2348 -
References () http://www.exploit-db.com/exploits/15620 - Exploit () http://www.exploit-db.com/exploits/15620 - Exploit
References () http://www.redhat.com/support/errata/RHSA-2010-0894.html - () http://www.redhat.com/support/errata/RHSA-2010-0894.html -
References () http://www.redhat.com/support/errata/RHSA-2010-0895.html - () http://www.redhat.com/support/errata/RHSA-2010-0895.html -
References () http://www.securityfocus.com/bid/44914 - Exploit () http://www.securityfocus.com/bid/44914 - Exploit
References () http://www.securitytracker.com/id?1024754 - () http://www.securitytracker.com/id?1024754 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/63344 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/63344 -
References () https://www.exploit-db.com/exploits/46730/ - () https://www.exploit-db.com/exploits/46730/ -

Information

Published : 2010-12-07 22:00

Updated : 2024-11-21 01:20


NVD link : CVE-2010-4170

Mitre link : CVE-2010-4170

CVE.ORG link : CVE-2010-4170


JSON object : View

Products Affected

systemtap

  • systemtap
CWE
CWE-264

Permissions, Privileges, and Access Controls