vendor:
Ptrace
by:
SecurityFocus
7.2
CVSS
HIGH
Ptrace Vulnerability
255
CWE
Product Name: Ptrace
Affected Version From: 2.2.x
Affected Version To: 2.2.x
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux
2002
Ptrace Vulnerability in Linux 2.2.x Kernels
The linux implementation of ptrace in 2.2.x kernels (and possibly earlier versions) contains a vulnerability that may allow an attacker to gain sensitive information in non-readable non-setuid executable files. When ptrace is called to trace a child process, it does not properly check to make sure that the disk image is readable to the user. As a result, the process can be traced and its core memory examined. Information compiled into the binary that was meant to be hidden via setting it non-readable may be disclosed to an attacker.
Mitigation:
Ensure that all setuid programs are not readable by non-privileged users. Ensure that all non-setuid programs are not readable by non-privileged users.