- Description
- An unprivileged attacker can craft a user-space process with a malicious ELF binary containing an out-of-range sh_link field. When root-level dtrace attaches to -- or instruments -- that process (via dtrace -p , pid probes, or USDT), the ELF parser reads heap memory beyond the allocated section cache array without any bounds check. This results in an uninitialized/out-of-bounds heap read that can cause a NULL pointer dereference crash of the dtrace process (DoS), or -- depending on heap layout -- a read-then-use of a garbage pointer controlled by adjacent allocations, providing a foothold toward further exploitation in a privileged context.
- Source
- secalert_us@oracle.com
- NVD status
- Analyzed
- Products
- linux
CVSS 3.1
- Type
- Secondary
- Base score
- 4.4
- Impact score
- 2.5
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
- Severity
- MEDIUM
- 134c704f-9b21-4f2e-91b3-4a467353bcc0
- CWE-125
- Hype score
- Not currently trending
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:oracle:linux:8:-:*:*:*:*:*:*",
"matchCriteriaId": "CA9021D6-6027-42E9-A12D-7EA32C5C63F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:oracle:linux:9:0:*:*:*:*:*:*",
"matchCriteriaId": "C848CA1D-A42D-4AF1-9D95-E6268F9C1880",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:oracle:linux:10:0:*:*:*:*:*:*",
"matchCriteriaId": "1F606DC6-31B5-4102-B174-D565662C4829",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]