CVE-2011-1760

utils/opcontrol in OProfile 0.9.6 and earlier might allow local users to conduct eval injection attacks and gain privileges via shell metacharacters in the -e argument.
References
Link Resource
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=624212 Exploit
http://openwall.com/lists/oss-security/2011/04/29/3 Exploit Patch
http://openwall.com/lists/oss-security/2011/05/01/1 Exploit Patch
http://openwall.com/lists/oss-security/2011/05/01/2 Exploit Patch
http://openwall.com/lists/oss-security/2011/05/02/17 Exploit Patch
http://openwall.com/lists/oss-security/2011/05/03/2 Exploit Patch
http://openwall.com/lists/oss-security/2011/05/10/6
http://openwall.com/lists/oss-security/2011/05/10/7 Patch
http://openwall.com/lists/oss-security/2011/05/11/1
http://secunia.com/advisories/44790
http://secunia.com/advisories/45205
http://www.debian.org/security/2011/dsa-2254
http://www.securityfocus.com/bid/47652 Exploit
http://www.ubuntu.com/usn/USN-1166-1
https://bugzilla.redhat.com/show_bug.cgi?id=700883 Exploit Patch
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=624212 Exploit
http://openwall.com/lists/oss-security/2011/04/29/3 Exploit Patch
http://openwall.com/lists/oss-security/2011/05/01/1 Exploit Patch
http://openwall.com/lists/oss-security/2011/05/01/2 Exploit Patch
http://openwall.com/lists/oss-security/2011/05/02/17 Exploit Patch
http://openwall.com/lists/oss-security/2011/05/03/2 Exploit Patch
http://openwall.com/lists/oss-security/2011/05/10/6
http://openwall.com/lists/oss-security/2011/05/10/7 Patch
http://openwall.com/lists/oss-security/2011/05/11/1
http://secunia.com/advisories/44790
http://secunia.com/advisories/45205
http://www.debian.org/security/2011/dsa-2254
http://www.securityfocus.com/bid/47652 Exploit
http://www.ubuntu.com/usn/USN-1166-1
https://bugzilla.redhat.com/show_bug.cgi?id=700883 Exploit Patch
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:maynard_johnson:oprofile:*:*:*:*:*:*:*:*
cpe:2.3:a:maynard_johnson:oprofile:0.1:*:*:*:*:*:*:*
cpe:2.3:a:maynard_johnson:oprofile:0.2:*:*:*:*:*:*:*
cpe:2.3:a:maynard_johnson:oprofile:0.3:*:*:*:*:*:*:*
cpe:2.3:a:maynard_johnson:oprofile:0.4:*:*:*:*:*:*:*
cpe:2.3:a:maynard_johnson:oprofile:0.5:*:*:*:*:*:*:*
cpe:2.3:a:maynard_johnson:oprofile:0.5.1:*:*:*:*:*:*:*
cpe:2.3:a:maynard_johnson:oprofile:0.5.2:*:*:*:*:*:*:*
cpe:2.3:a:maynard_johnson:oprofile:0.5.3:*:*:*:*:*:*:*
cpe:2.3:a:maynard_johnson:oprofile:0.5.4:*:*:*:*:*:*:*
cpe:2.3:a:maynard_johnson:oprofile:0.6:*:*:*:*:*:*:*
cpe:2.3:a:maynard_johnson:oprofile:0.6.1:*:*:*:*:*:*:*
cpe:2.3:a:maynard_johnson:oprofile:0.7:*:*:*:*:*:*:*
cpe:2.3:a:maynard_johnson:oprofile:0.7.1:*:*:*:*:*:*:*
cpe:2.3:a:maynard_johnson:oprofile:0.8:*:*:*:*:*:*:*
cpe:2.3:a:maynard_johnson:oprofile:0.8.1:*:*:*:*:*:*:*
cpe:2.3:a:maynard_johnson:oprofile:0.8.2:*:*:*:*:*:*:*
cpe:2.3:a:maynard_johnson:oprofile:0.9:*:*:*:*:*:*:*
cpe:2.3:a:maynard_johnson:oprofile:0.9.1:*:*:*:*:*:*:*
cpe:2.3:a:maynard_johnson:oprofile:0.9.2:*:*:*:*:*:*:*
cpe:2.3:a:maynard_johnson:oprofile:0.9.3:*:*:*:*:*:*:*
cpe:2.3:a:maynard_johnson:oprofile:0.9.4:*:*:*:*:*:*:*
cpe:2.3:a:maynard_johnson:oprofile:0.9.5:*:*:*:*:*:*:*

History

21 Nov 2024, 01:26

Type Values Removed Values Added
References () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=624212 - Exploit () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=624212 - Exploit
References () http://openwall.com/lists/oss-security/2011/04/29/3 - Exploit, Patch () http://openwall.com/lists/oss-security/2011/04/29/3 - Exploit, Patch
References () http://openwall.com/lists/oss-security/2011/05/01/1 - Exploit, Patch () http://openwall.com/lists/oss-security/2011/05/01/1 - Exploit, Patch
References () http://openwall.com/lists/oss-security/2011/05/01/2 - Exploit, Patch () http://openwall.com/lists/oss-security/2011/05/01/2 - Exploit, Patch
References () http://openwall.com/lists/oss-security/2011/05/02/17 - Exploit, Patch () http://openwall.com/lists/oss-security/2011/05/02/17 - Exploit, Patch
References () http://openwall.com/lists/oss-security/2011/05/03/2 - Exploit, Patch () http://openwall.com/lists/oss-security/2011/05/03/2 - Exploit, Patch
References () http://openwall.com/lists/oss-security/2011/05/10/6 - () http://openwall.com/lists/oss-security/2011/05/10/6 -
References () http://openwall.com/lists/oss-security/2011/05/10/7 - Patch () http://openwall.com/lists/oss-security/2011/05/10/7 - Patch
References () http://openwall.com/lists/oss-security/2011/05/11/1 - () http://openwall.com/lists/oss-security/2011/05/11/1 -
References () http://secunia.com/advisories/44790 - () http://secunia.com/advisories/44790 -
References () http://secunia.com/advisories/45205 - () http://secunia.com/advisories/45205 -
References () http://www.debian.org/security/2011/dsa-2254 - () http://www.debian.org/security/2011/dsa-2254 -
References () http://www.securityfocus.com/bid/47652 - Exploit () http://www.securityfocus.com/bid/47652 - Exploit
References () http://www.ubuntu.com/usn/USN-1166-1 - () http://www.ubuntu.com/usn/USN-1166-1 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=700883 - Exploit, Patch () https://bugzilla.redhat.com/show_bug.cgi?id=700883 - Exploit, Patch

Information

Published : 2011-06-09 19:55

Updated : 2024-11-21 01:26


NVD link : CVE-2011-1760

Mitre link : CVE-2011-1760

CVE.ORG link : CVE-2011-1760


JSON object : View

Products Affected

maynard_johnson

  • oprofile
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')