Ubuntu 10.04 LTS : oprofile vulnerabilities (USN-1166-1)

Ubuntu Security Notice (C) 2011-2013 Canonical, Inc. / NASL script (C) 2011-2013 Tenable Network Security, Inc.


Synopsis :

The remote Ubuntu host is missing a security-related patch.

Description :

Stephane Chauveau discovered that OProfile did not properly perform
input validation when processing arguments to opcontrol. A local user
who is allowed to run opcontrol with privileges could exploit this to
run arbitrary commands as the privileged user. (CVE-2011-1760,
CVE-2011-2471)

Stephane Chauveau discovered a directory traversal vulnerability in
OProfile when processing the --save argument to opcontrol. A local
user could exploit this to overwrite arbitrary files with the
privileges of the user invoking the program. (CVE-2011-2472).

Solution :

Update the affected oprofile package.

Risk factor :

High / CVSS Base Score : 7.2
(CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 6.0
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Family: Ubuntu Local Security Checks

Nessus Plugin ID: 55567 ()

Bugtraq ID: 47652
48241

CVE ID: CVE-2011-1760
CVE-2011-2471
CVE-2011-2472