CVE-2011-1760
Severity CVSS v4.0:
Pending analysis
Type:
CWE-94
Code Injection
Publication date:
09/06/2011
Last modified:
11/04/2025
Description
utils/opcontrol in OProfile 0.9.6 and earlier might allow local users to conduct eval injection attacks and gain privileges via shell metacharacters in the -e argument.
Impact
Base Score 2.0
7.20
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:maynard_johnson:oprofile:*:*:*:*:*:*:*:* | 0.9.6 (including) | |
cpe:2.3:a:maynard_johnson:oprofile:0.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:maynard_johnson:oprofile:0.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:maynard_johnson:oprofile:0.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:maynard_johnson:oprofile:0.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:maynard_johnson:oprofile:0.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:maynard_johnson:oprofile:0.5.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:maynard_johnson:oprofile:0.5.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:maynard_johnson:oprofile:0.5.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:maynard_johnson:oprofile:0.5.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:maynard_johnson:oprofile:0.6:*:*:*:*:*:*:* | ||
cpe:2.3:a:maynard_johnson:oprofile:0.6.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:maynard_johnson:oprofile:0.7:*:*:*:*:*:*:* | ||
cpe:2.3:a:maynard_johnson:oprofile:0.7.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:maynard_johnson:oprofile:0.8:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=624212
- http://openwall.com/lists/oss-security/2011/04/29/3
- http://openwall.com/lists/oss-security/2011/05/01/1
- http://openwall.com/lists/oss-security/2011/05/01/2
- http://openwall.com/lists/oss-security/2011/05/02/17
- http://openwall.com/lists/oss-security/2011/05/03/2
- http://openwall.com/lists/oss-security/2011/05/10/6
- http://openwall.com/lists/oss-security/2011/05/10/7
- http://openwall.com/lists/oss-security/2011/05/11/1
- http://secunia.com/advisories/44790
- http://secunia.com/advisories/45205
- http://www.debian.org/security/2011/dsa-2254
- http://www.securityfocus.com/bid/47652
- http://www.ubuntu.com/usn/USN-1166-1
- https://bugzilla.redhat.com/show_bug.cgi?id=700883
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=624212
- http://openwall.com/lists/oss-security/2011/04/29/3
- http://openwall.com/lists/oss-security/2011/05/01/1
- http://openwall.com/lists/oss-security/2011/05/01/2
- http://openwall.com/lists/oss-security/2011/05/02/17
- http://openwall.com/lists/oss-security/2011/05/03/2
- http://openwall.com/lists/oss-security/2011/05/10/6
- http://openwall.com/lists/oss-security/2011/05/10/7
- http://openwall.com/lists/oss-security/2011/05/11/1
- http://secunia.com/advisories/44790
- http://secunia.com/advisories/45205
- http://www.debian.org/security/2011/dsa-2254
- http://www.securityfocus.com/bid/47652
- http://www.ubuntu.com/usn/USN-1166-1
- https://bugzilla.redhat.com/show_bug.cgi?id=700883