Cpe Name:
cpe:2.3:a:maynard_johnson:oprofile:0.6:*:*:*:*:*:*:*
# |
CVE ID
|
CWE ID
|
# of Exploits
|
Vulnerability Type(s)
|
Publish Date
|
Update Date
|
Score
|
Gained Access Level
|
Access
|
Complexity
|
Authentication
|
Conf.
|
Integ.
|
Avail.
|
1 |
CVE-2011-2473 |
59 |
|
|
2011-06-09 |
2017-08-29 |
6.3 |
None |
Local |
Medium |
Not required |
None |
Complete |
Complete |
The do_dump_data function in utils/opcontrol in OProfile 0.9.6 and earlier might allow local users to create or overwrite arbitrary files via a crafted --session-dir argument in conjunction with a symlink attack on the opd_pipe file, a different vulnerability than CVE-2011-1760. |
2 |
CVE-2011-2472 |
22 |
|
Dir. Trav. |
2011-06-09 |
2017-08-29 |
6.3 |
None |
Local |
Medium |
Not required |
None |
Complete |
Complete |
Directory traversal vulnerability in utils/opcontrol in OProfile 0.9.6 and earlier might allow local users to overwrite arbitrary files via a .. (dot dot) in the --save argument, related to the --session-dir argument, a different vulnerability than CVE-2011-1760. |
3 |
CVE-2011-2471 |
264 |
|
+Priv |
2011-06-09 |
2017-08-29 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
utils/opcontrol in OProfile 0.9.6 and earlier might allow local users to gain privileges via shell metacharacters in the (1) --vmlinux, (2) --session-dir, or (3) --xen argument, related to the daemonrc file and the do_save_setup and do_load_setup functions, a different vulnerability than CVE-2011-1760. |
4 |
CVE-2011-1760 |
94 |
|
+Priv |
2011-06-09 |
2011-09-07 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
utils/opcontrol in OProfile 0.9.6 and earlier might allow local users to conduct eval injection attacks and gain privileges via shell metacharacters in the -e argument. |
5 |
CVE-2006-0576 |
|
|
Exec Code |
2006-02-08 |
2018-10-19 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
Untrusted search path vulnerability in opcontrol in OProfile 0.9.1 and earlier allows local users to execute arbitrary commands via a modified PATH that references malicious (1) which or (2) dirname programs. NOTE: while opcontrol normally is not run setuid, a common configuration suggests accessing opcontrol using sudo. In such a context, this is a vulnerability. |
Total number of vulnerabilities :
5
Page :
1
(This Page)