漏洞信息详情
OProfile utils/opcontrol ‘set_event()’本地权限提升漏洞
- CNNVD编号:CNNVD-201106-055
- 危害等级: 高危
- CVE编号:
CVE-2011-1760
- 漏洞类型:
代码注入
- 发布时间:
2011-06-08
- 威胁类型:
本地
- 更新时间:
2011-06-10
- 厂 商:
maynard_johnson - 漏洞来源:
-
漏洞简介
OProfile 0.9.6及其早期版本的utils/opcontrol存在漏洞。本地用户可以借助-e参数的shell元字符进行eval注入攻击以及获取特权。
参考网址
来源: bugzilla.redhat.com
链接:https://bugzilla.redhat.com/show_bug.cgi?id=700883
来源: BID
名称: 47652
链接:http://www.securityfocus.com/bid/47652
来源: DEBIAN
名称: DSA-2254
链接:http://www.debian.org/security/2011/dsa-2254
来源: MLIST
名称: [oss-security] 20110511 Re: Re: CVE Request — oprofile — Local privilege escalation via crafted opcontrol event parameter when authorized by sudo
链接:http://openwall.com/lists/oss-security/2011/05/11/1
来源: MLIST
名称: [oss-security] 20110510 Re: Re: CVE Request — oprofile — Local privilege escalation via crafted opcontrol event parameter when authorized by sudo
链接:http://openwall.com/lists/oss-security/2011/05/10/7
来源: MLIST
名称: [oss-security] 20110510 Re: Re: CVE Request — oprofile — Local privilege escalation via crafted opcontrol event parameter when authorized by sudo
链接:http://openwall.com/lists/oss-security/2011/05/10/6
来源: MLIST
名称: [oss-security] 20110503 Re: CVE Request — oprofile — Local privilege escalation via crafted opcontrol event parameter when authorized by sudo
链接:http://openwall.com/lists/oss-security/2011/05/03/2
来源: MLIST
名称: [oss-security] 20110502 Re: CVE Request — oprofile — Local privilege escalation via crafted opcontrol event parameter when authorized by sudo
链接:http://openwall.com/lists/oss-security/2011/05/02/17
来源: MLIST
名称: [oss-security] 20110430 Re: CVE Request — oprofile — Local privilege escalation via crafted opcontrol event parameter when authorized by sudo
链接:http://openwall.com/lists/oss-security/2011/05/01/2
来源: MLIST
名称: [oss-security] 20110430 Re: CVE Request — oprofile — Local privilege escalation via crafted opcontrol event parameter when authorized by sudo
链接:http://openwall.com/lists/oss-security/2011/05/01/1
来源: MLIST
名称: [oss-security] 20110429 CVE Request — oprofile — Local privilege escalation via crafted opcontrol event parameter when authorized by sudo
链接:http://openwall.com/lists/oss-security/2011/04/29/3
来源: bugs.debian.org
链接:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=624212
来源:SECUNIA
名称:44790
链接:http://secunia.com/advisories/44790
来源:NSFOCUS
名称:16962
链接:http://www.nsfocus.net/vulndb/16962
来源:NSFOCUS
名称:16961
链接:http://www.nsfocus.net/vulndb/16961