Summary
This host is installed OProfile and is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow local users to run arbitrary commands with super-user privileges.
Impact Level: Application.
Solution
Apply the patchs from below links
https://bugzilla.redhat.com/attachment.cgi?id=499232 https://bugzilla.redhat.com/attachment.cgi?id=499233 https://bugzilla.redhat.com/attachment.cgi?id=499234 https://bugzilla.redhat.com/attachment.cgi?id=499235
*****
NOTE: Ignore this warning if above mentioned patch is already applied.
*****
Insight
The flaws are due to an error,
- while handling content of event argument, provided to oprofile profiling control utility (opcontrol).
- while handling 'do_dump_data' function, allows local users to create or overwrite arbitrary files via a crafted --session-dir argument in conjunction with a symlink attack on the opd_pipe file.
- in 'utils/opcontrol', allow local users to conduct eval injection attacks and gain privileges via shell meta characters in the several arguments.
Affected
OProfile version 0.9.6 and prior.
References
Severity
Classification
-
CVE CVE-2011-1760, CVE-2011-2471, CVE-2011-2472, CVE-2011-2473 -
CVSS Base Score: 7.2
AV:L/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities