Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 146377 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.120413
Kategorie:Amazon Linux Local Security Checks
Titel:Amazon Linux: Security Advisory (ALAS-2012-54)
Zusammenfassung:The remote host is missing an update for the 'systemtap' package(s) announced via the ALAS-2012-54 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'systemtap' package(s) announced via the ALAS-2012-54 advisory.

Vulnerability Insight:
An invalid pointer read flaw was found in the way SystemTap handled malformed debugging information in DWARF format. When SystemTap unprivileged mode was enabled, an unprivileged user in the stapusr group could use this flaw to crash the system or, potentially, read arbitrary kernel memory. Additionally, a privileged user (root, or a member of the stapdev group) could trigger this flaw when tricked into instrumenting a specially-crafted ELF binary, even when unprivileged mode was not enabled. (CVE-2012-0875)

Affected Software/OS:
'systemtap' package(s) on Amazon Linux.

Solution:
Please install the updated package(s).

CVSS Score:
5.4

CVSS Vector:
AV:L/AC:M/Au:N/C:P/I:N/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2012-0875
1026777
http://securitytracker.com/id?1026777
RHSA-2012:0376
http://rhn.redhat.com/errata/RHSA-2012-0376.html
[oss-security] 20120222 CVE-2012-0875: systemtap memory disclosure/kernel panic when processing malformed DWARF unwind data
http://permalink.gmane.org/gmane.comp.security.oss.general/6987
http://sourceware.org/bugzilla/show_bug.cgi?id=13714
http://sourceware.org/git/?p=systemtap.git%3Ba=commit%3Bh=64b0cff3b
openSUSE-SU-2013:0475
http://lists.opensuse.org/opensuse-updates/2013-03/msg00057.html
CopyrightCopyright (C) 2015 Greenbone AG

Dies ist nur einer von 146377 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.