← Voltar para CVEs
CVE-2010-0411
N/ADescricao
Multiple integer signedness errors in the (1) __get_argv and (2) __get_compat_argv functions in tapset/aux_syscalls.stp in SystemTap 1.1 allow local users to cause a denial of service (script crash, or system crash or hang) via a process with a large number of arguments, leading to a buffer overflow.
Detalhes CVE
Pontuacao CVSS v3.1N/A
Publicado2/8/2010
Ultima modificacao4/11/2025
Fontenvd
Avistamentos honeypot0
Produtos afetados
systemtap:systemtap
Fraquezas (CWE)
CWE-189
Referencias
http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035201.html(secalert@redhat.com)
http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035261.html(secalert@redhat.com)
http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00006.html(secalert@redhat.com)
http://marc.info/?l=oss-security&m=126530657715364&w=2(secalert@redhat.com)
http://secunia.com/advisories/38426(secalert@redhat.com)
http://secunia.com/advisories/38680(secalert@redhat.com)
http://secunia.com/advisories/38765(secalert@redhat.com)
http://secunia.com/advisories/38817(secalert@redhat.com)
http://secunia.com/advisories/39656(secalert@redhat.com)
http://securitytracker.com/id?1023664(secalert@redhat.com)
http://sourceware.org/bugzilla/show_bug.cgi?id=11234(secalert@redhat.com)
http://sourceware.org/git/gitweb.cgi?p=systemtap.git%3Ba=commit%3Bh=a2d399c87a642190f08ede63dc6fc434a5a8363a(secalert@redhat.com)
http://www.redhat.com/support/errata/RHSA-2010-0124.html(secalert@redhat.com)
http://www.redhat.com/support/errata/RHSA-2010-0125.html(secalert@redhat.com)
http://www.securityfocus.com/bid/38120(secalert@redhat.com)
http://www.vupen.com/english/advisories/2010/1001(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=559719(secalert@redhat.com)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9675(secalert@redhat.com)
http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035201.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035261.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00006.html(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=oss-security&m=126530657715364&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/38426(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/38680(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/38765(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/38817(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/39656(af854a3a-2127-422b-91ae-364da2661108)
http://securitytracker.com/id?1023664(af854a3a-2127-422b-91ae-364da2661108)
http://sourceware.org/bugzilla/show_bug.cgi?id=11234(af854a3a-2127-422b-91ae-364da2661108)
http://sourceware.org/git/gitweb.cgi?p=systemtap.git%3Ba=commit%3Bh=a2d399c87a642190f08ede63dc6fc434a5a8363a(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2010-0124.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2010-0125.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/38120(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2010/1001(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=559719(af854a3a-2127-422b-91ae-364da2661108)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9675(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.