Unrated severityNVD Advisory· Published Jan 26, 2010· Updated Apr 29, 2026
CVE-2009-4273
CVE-2009-4273
Description
stap-server in SystemTap before 1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in stap command-line arguments in a request.
Affected products
25cpe:2.3:a:systemtap:systemtap:*:*:*:*:*:*:*:*+ 24 more
- cpe:2.3:a:systemtap:systemtap:*:*:*:*:*:*:*:*range: <=1.0
- cpe:2.3:a:systemtap:systemtap:0.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.3:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.4:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.5:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.5.4:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.5.5:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.5.7:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.5.8:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.5.9:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.5.10:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.5.12:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.5.13:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.5.14:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.6:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.7:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.7.2:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.8:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.9:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.9.5:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.9.7:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.9.8:*:*:*:*:*:*:*
- cpe:2.3:a:systemtap:systemtap:0.9.9:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
16- lists.fedoraproject.org/pipermail/package-announce/2010-January/034041.htmlnvdPatch
- sourceware.org/systemtap/ftp/releases/systemtap-1.1.tar.gznvdPatch
- secunia.com/advisories/38154nvdVendor Advisory
- secunia.com/advisories/38216nvdVendor Advisory
- www.vupen.com/english/advisories/2010/0169nvdVendor Advisory
- lists.fedoraproject.org/pipermail/package-announce/2010-February/035201.htmlnvd
- lists.fedoraproject.org/pipermail/package-announce/2010-February/035261.htmlnvd
- lists.fedoraproject.org/pipermail/package-announce/2010-January/034036.htmlnvd
- lists.fedoraproject.org/pipermail/scm-commits/2010-February/394714.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2010-04/msg00006.htmlnvd
- secunia.com/advisories/38765nvd
- secunia.com/advisories/39656nvd
- www.redhat.com/support/errata/RHSA-2010-0124.htmlnvd
- www.vupen.com/english/advisories/2010/1001nvd
- bugzilla.redhat.com/show_bug.cginvd
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11417nvd
News mentions
0No linked articles in our index yet.