Professional OVAL Repository
[Eng]
[Rus]
[Sign-In]
OVAL
Search
Categories
RedCheck
About
OVAL Definitions
OVAL Items
FSTEC Data Bank Information Security Threats
NKCKI
EOL (End Of Life)
Linux Security Advisories
Mozilla Foundation Security Advisory
IBM
VMware
Cisco
Check Point Software Technologies
Apache
Solaris
FreeBSD
Development
GitHub Enterprise
Google Chrome Security Advisories
Oracle Security Advisories
Adobe Security Advisories
OpenSSL Security Advisories
Microsoft
CVE
CWE
CPE
Latest Updates
OS ROSA
ALT Linux
Astra Linux
RED OS
DSA (Debian Security Advisory) Patсh Statistics
DSA (Debian Security Advisory) Patсh Feed
DSA (Debian Security Advisory) Vulnerability Feed
DLA (Debian Security Advisory) Patсh Statistics
DLA (Debian Security Advisory) Patсh Feed
DLA (Debian Security Advisory) Vulnerability Feed
ALT Linux (Security Bulletins) Patсh Statistics
ALT Linux (Security Bulletins) Patсh Feed
ALT Linux (Security Bulletins) Vulnerability Feed
RED OS (Security Bulletins) Patсh Statistics
RED OS (Security Bulletins) Patсh Feed
RED OS (Security Bulletins) Vulnerability Feed
USN (Ubuntu Security Notice) Patсh Statistics
USN (Ubuntu Security Notice) Patсh Feed
USN (Ubuntu Security Notice) Vulnerability Feed
RHSA (RedHat Security Advisory) Patсh Statistics
RHSA (RedHat Security Advisory) Patсh Feed
RHSA (RedHat Security Advisory) Vulnerability Feed
ELSA (Oracle Linux Security Advisory) Patсh Statistics
ELSA (Oracle Linux Security Advisory) Patсh Feed
ELSA (Oracle Linux Security Advisory) Vulnerability Feed
SUSE (SUSE Security Advisories) Patсh Statistics
SUSE (SUSE Security Advisories) Patсh Feed
SUSE (SUSE Security Advisories) Vulnerability Feed
openSUSE (openSUSE Security Advisories) Patсh Statistics
openSUSE (openSUSE Security Advisories) Patсh Feed
openSUSE (openSUSE Security Advisories) Vulnerability Feed
Amazon Linux AMI (Security Bulletins) Patсh Statistics
Amazon Linux AMI (Security Bulletins) Patсh Feed
Amazon Linux AMI (Security Bulletins) Vulnerability Feed
Mageia Linux (Security Bulletins) Patсh Statistics
Mageia Linux (Security Bulletins) Patсh Feed
Mageia Linux (Security Bulletins) Vulnerability Feed
OS ROSA SX COBALT 1.0
OS ROSA DX COBALT 1.0
ROSA 7.3 (Security Advisories) Patсh Statistics
ROSA 7.3 (Security Advisories) Patсh Feed
ROSA 7.3 (Security Advisories) Vulnerability Feed
ALT Linux SPT 6.0
ALT Linux SPT 7.0
ALT 8 SP
ALT 9
Astra Linux SE 1.5
Astra Linux SE 1.6
Astra Linux SE 1.7
Astra Linux SE 1.8
RED OS Murom 7.1
RED OS Murom 7.2
IBM DB2
VMware Vulnerabilities Advisory (VMSA)
VMware vCenter Patch Advisories
VMware ESXi Patch Advisories
VMware NSX Patches
VMware NSX Vulnerabilities
VMware Photon OS 1.0 Patches
VMware Photon OS 1.0 Vulnerabilities
VMware Photon OS 2.0 Patches
VMware Photon OS 2.0 Vulnerabilities
Cisco ASA
Cisco IOS/NX-OS Advisory
Cisco NX-OS Vulnerabilities
Check Point Gaia
Apache Tomcat Advisories
Apache Tomcat Server
Apache HTTP Server
Python
Node.js
RubyGems
Qt
Microsoft Security Bulletin
Microsoft Knowledge Base Article
Microsoft SharePoint
Microsoft SharePoint Foundation 2013
Microsoft SharePoint Server 2013
Microsoft SharePoint Server 2016
About OVALdb
User manual
Pricing
Contact us
OVAL Definitions
>
OVAL Definition Details
Id
oval:ru.altx-soft.nix:def:76299
[Eng]
Version
3
Class
vulnerability
ALTXid
247108
Language
Russian
Severity
Medium
Title
SLES -- уязвимость в systemtap (CVE-2012-0875)
Description
В продукте systemtap обнаружена уязвимость CVE-2012-0875.
Family
unix
Platform
SUSE Linux Enterprise Server 11
Product
systemtap
Reference
FSTEC: BDU:2015-09709
FSTEC: BDU:2015-09709
Id:
BDU:2015-09709
Reference:
https://bdu.fstec.ru/vul/2015-09709
FSTEC: BDU:2015-08819
FSTEC: BDU:2015-08819
Id:
BDU:2015-08819
Reference:
https://bdu.fstec.ru/vul/2015-08819
FSTEC: BDU:2015-08818
FSTEC: BDU:2015-08818
Id:
BDU:2015-08818
Reference:
https://bdu.fstec.ru/vul/2015-08818
FSTEC: BDU:2015-08817
FSTEC: BDU:2015-08817
Id:
BDU:2015-08817
Reference:
https://bdu.fstec.ru/vul/2015-08817
FSTEC: BDU:2015-08816
FSTEC: BDU:2015-08816
Id:
BDU:2015-08816
Reference:
https://bdu.fstec.ru/vul/2015-08816
FSTEC: BDU:2015-08815
FSTEC: BDU:2015-08815
Id:
BDU:2015-08815
Reference:
https://bdu.fstec.ru/vul/2015-08815
FSTEC: BDU:2015-08814
FSTEC: BDU:2015-08814
Id:
BDU:2015-08814
Reference:
https://bdu.fstec.ru/vul/2015-08814
FSTEC: BDU:2015-08813
FSTEC: BDU:2015-08813
Id:
BDU:2015-08813
Reference:
https://bdu.fstec.ru/vul/2015-08813
FSTEC: BDU:2015-06700
FSTEC: BDU:2015-06700
Id:
BDU:2015-06700
Reference:
https://bdu.fstec.ru/vul/2015-06700
FSTEC: BDU:2015-06699
FSTEC: BDU:2015-06699
Id:
BDU:2015-06699
Reference:
https://bdu.fstec.ru/vul/2015-06699
FSTEC: BDU:2015-06698
FSTEC: BDU:2015-06698
Id:
BDU:2015-06698
Reference:
https://bdu.fstec.ru/vul/2015-06698
FSTEC: BDU:2015-06697
FSTEC: BDU:2015-06697
Id:
BDU:2015-06697
Reference:
https://bdu.fstec.ru/vul/2015-06697
FSTEC: BDU:2015-06696
FSTEC: BDU:2015-06696
Id:
BDU:2015-06696
Reference:
https://bdu.fstec.ru/vul/2015-06696
FSTEC: BDU:2015-06695
FSTEC: BDU:2015-06695
Id:
BDU:2015-06695
Reference:
https://bdu.fstec.ru/vul/2015-06695
FSTEC: BDU:2015-06694
FSTEC: BDU:2015-06694
Id:
BDU:2015-06694
Reference:
https://bdu.fstec.ru/vul/2015-06694
CVE: CVE-2012-0875
CVE: CVE-2012-0875
Id:
CVE-2012-0875
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0875
Comment
: SystemTap 1.7, 1.6.7, and probably other versions, when unprivileged mode is enabled, allows local users to obtain sensitive information from kernel memory or cause a denial of service (kernel panic and crash) via vectors related to crafted DWARF data, which triggers a read of an invalid pointer.
CVSSv2 Score:
5.4
Access vector:
LOCAL
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:M/Au:N/C:P/I:N/A:C
CWE:
264 (Permissions, Privileges, and Access Controls)
References:
openSUSE-SU-2013:0475 (SUSE)
[oss-security] 20120222 CVE-2012-0875: systemtap memory disclosure/kernel panic when processing malformed DWARF unwind data (MLIST)
http://sourceware.org/bugzilla/show_bug.cgi?id=13714 (CONFIRM)
1026777 (SECTRACK)
RHSA-2012:0376 (REDHAT)
http://sourceware.org/git/?p=systemtap.git%3Ba=commit%3Bh=64b0cff3b (MISC)
VENDOR: SUSE-SU-2013:0669-1
VENDOR: SUSE-SU-2013:0669-1
Id:
SUSE-SU-2013:0669-1
Reference:
https://www.suse.com/support/update/announcement/2013/suse-su-20130669-1.html
Content available only for registered users!
ovaldb@altx-soft.com