OProfile utils/opcontrol ‘set_event()’本地权限提升漏洞

漏洞信息详情

OProfile utils/opcontrol ‘set_event()’本地权限提升漏洞

漏洞简介

OProfile 0.9.6及其早期版本的utils/opcontrol存在漏洞。本地用户可以借助-e参数的shell元字符进行eval注入攻击以及获取特权。

漏洞公告

目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接:

http://oprofile.sourceforge.net/download/

参考网址

来源: bugzilla.redhat.com

链接:https://bugzilla.redhat.com/show_bug.cgi?id=700883

来源: BID

名称: 47652

链接:http://www.securityfocus.com/bid/47652

来源: DEBIAN

名称: DSA-2254

链接:http://www.debian.org/security/2011/dsa-2254

来源: MLIST

名称: [oss-security] 20110511 Re: Re: CVE Request — oprofile — Local privilege escalation via crafted opcontrol event parameter when authorized by sudo

链接:http://openwall.com/lists/oss-security/2011/05/11/1

来源: MLIST

名称: [oss-security] 20110510 Re: Re: CVE Request — oprofile — Local privilege escalation via crafted opcontrol event parameter when authorized by sudo

链接:http://openwall.com/lists/oss-security/2011/05/10/7

来源: MLIST

名称: [oss-security] 20110510 Re: Re: CVE Request — oprofile — Local privilege escalation via crafted opcontrol event parameter when authorized by sudo

链接:http://openwall.com/lists/oss-security/2011/05/10/6

来源: MLIST

名称: [oss-security] 20110503 Re: CVE Request — oprofile — Local privilege escalation via crafted opcontrol event parameter when authorized by sudo

链接:http://openwall.com/lists/oss-security/2011/05/03/2

来源: MLIST

名称: [oss-security] 20110502 Re: CVE Request — oprofile — Local privilege escalation via crafted opcontrol event parameter when authorized by sudo

链接:http://openwall.com/lists/oss-security/2011/05/02/17

来源: MLIST

名称: [oss-security] 20110430 Re: CVE Request — oprofile — Local privilege escalation via crafted opcontrol event parameter when authorized by sudo

链接:http://openwall.com/lists/oss-security/2011/05/01/2

来源: MLIST

名称: [oss-security] 20110430 Re: CVE Request — oprofile — Local privilege escalation via crafted opcontrol event parameter when authorized by sudo

链接:http://openwall.com/lists/oss-security/2011/05/01/1

来源: MLIST

名称: [oss-security] 20110429 CVE Request — oprofile — Local privilege escalation via crafted opcontrol event parameter when authorized by sudo

链接:http://openwall.com/lists/oss-security/2011/04/29/3

来源: bugs.debian.org

链接:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=624212

来源:SECUNIA

名称:44790

链接:http://secunia.com/advisories/44790
来源:NSFOCUS
名称:16962
链接:http://www.nsfocus.net/vulndb/16962

来源:NSFOCUS
名称:16961
链接:http://www.nsfocus.net/vulndb/16961

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享