Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:maynard_johnson:oprofile:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA1E7F4E-6EC0-4D68-8867-075ED4667571", "versionEndIncluding": "0.9.6", "vulnerable": true}, {"criteria": "cpe:2.3:a:maynard_johnson:oprofile:0.1:*:*:*:*:*:*:*", "matchCriteriaId": "0F64BD56-0FCA-489B-8AB7-C0F9726A00D6", "vulnerable": true}, {"criteria": "cpe:2.3:a:maynard_johnson:oprofile:0.2:*:*:*:*:*:*:*", "matchCriteriaId": "9AF9D9DF-7709-4127-8CC6-AE692EC118C8", "vulnerable": true}, {"criteria": "cpe:2.3:a:maynard_johnson:oprofile:0.3:*:*:*:*:*:*:*", "matchCriteriaId": "58E4F6E3-E26C-465F-AF71-0F59E4F537D9", "vulnerable": true}, {"criteria": "cpe:2.3:a:maynard_johnson:oprofile:0.4:*:*:*:*:*:*:*", "matchCriteriaId": "7E008E77-4062-44A9-AD98-840AC0983D8A", "vulnerable": true}, {"criteria": "cpe:2.3:a:maynard_johnson:oprofile:0.5:*:*:*:*:*:*:*", "matchCriteriaId": "16818016-0256-4503-8740-6CDBDDDD3C77", "vulnerable": true}, {"criteria": "cpe:2.3:a:maynard_johnson:oprofile:0.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "ED019ED4-F39D-412D-A434-CDE919008716", "vulnerable": true}, {"criteria": "cpe:2.3:a:maynard_johnson:oprofile:0.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "F9BC15E9-28C1-4578-83F0-C4FAA1E5F6F5", "vulnerable": true}, {"criteria": "cpe:2.3:a:maynard_johnson:oprofile:0.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "F2847991-B3A8-4AD7-BA6E-33BBCFF942D4", "vulnerable": true}, {"criteria": "cpe:2.3:a:maynard_johnson:oprofile:0.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "A387B777-6D05-4015-9AC2-496138961266", "vulnerable": true}, {"criteria": "cpe:2.3:a:maynard_johnson:oprofile:0.6:*:*:*:*:*:*:*", "matchCriteriaId": "476D6DFF-BA04-4F2C-9A78-D0E896A842D3", "vulnerable": true}, {"criteria": "cpe:2.3:a:maynard_johnson:oprofile:0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "7FE248AE-6EC1-4AF9-B960-199910EF3C8F", "vulnerable": true}, {"criteria": "cpe:2.3:a:maynard_johnson:oprofile:0.7:*:*:*:*:*:*:*", "matchCriteriaId": "49C89589-3969-4EFC-ABD6-B982AC81AF45", "vulnerable": true}, {"criteria": "cpe:2.3:a:maynard_johnson:oprofile:0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "A7EF60C0-AF4F-466E-9EBE-3EBA55024019", "vulnerable": true}, {"criteria": "cpe:2.3:a:maynard_johnson:oprofile:0.8:*:*:*:*:*:*:*", "matchCriteriaId": "296E08E8-7F9A-418C-8EEE-6C997B40A7FC", "vulnerable": true}, {"criteria": "cpe:2.3:a:maynard_johnson:oprofile:0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "243C970A-DDE5-4C1C-8E19-DAFF5316343A", "vulnerable": true}, {"criteria": "cpe:2.3:a:maynard_johnson:oprofile:0.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "90866C6B-32CF-4E08-9103-4F826963364F", "vulnerable": true}, {"criteria": "cpe:2.3:a:maynard_johnson:oprofile:0.9:*:*:*:*:*:*:*", "matchCriteriaId": "E18D8FFF-BA38-4580-80BA-AEE6B794B6C5", "vulnerable": true}, {"criteria": "cpe:2.3:a:maynard_johnson:oprofile:0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "F87619D9-1549-468B-A94D-B7CC1004B4EA", "vulnerable": true}, {"criteria": "cpe:2.3:a:maynard_johnson:oprofile:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "319DF855-E38D-4938-932D-98A37CA77632", "vulnerable": true}, {"criteria": "cpe:2.3:a:maynard_johnson:oprofile:0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "6EBD560F-5681-4150-857F-62491817B1EB", "vulnerable": true}, {"criteria": "cpe:2.3:a:maynard_johnson:oprofile:0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "5117A4C6-E1AA-4FE4-9338-E309945ADD7C", "vulnerable": true}, {"criteria": "cpe:2.3:a:maynard_johnson:oprofile:0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "C272F121-D41F-4D99-9609-678A1F76E54F", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Directory traversal vulnerability in utils/opcontrol in OProfile 0.9.6 and earlier might allow local users to overwrite arbitrary files via a .. (dot dot) in the --save argument, related to the --session-dir argument, a different vulnerability than CVE-2011-1760."}, {"lang": "es", "value": "Vulnerabilidad de salto de directorio en utils/opcontrol in OProfile v0.9.6 y anteriores, permite a atacantes remotos incluir y ejecutar ficheros locales de su elecci\u00f3n al utilizar caracteres .. (punto punto) en el argumento --save , relacionado con el argumento --session-dir, vulnerabilidad diferente de CVE-2011-1760.\r\n"}], "id": "CVE-2011-2472", "lastModified": "2025-04-11T00:51:21.963", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.3, "confidentialityImpact": "NONE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:N/I:C/A:C", "version": "2.0"}, "exploitabilityScore": 3.4, "impactScore": 9.2, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2011-06-09T21:55:01.337", "references": [{"source": "cve@mitre.org", "tags": ["Exploit"], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=624212"}, {"source": "cve@mitre.org", "url": "http://openwall.com/lists/oss-security/2011/05/03/1"}, {"source": "cve@mitre.org", "url": "http://openwall.com/lists/oss-security/2011/05/10/6"}, {"source": "cve@mitre.org", "tags": ["Patch"], "url": "http://openwall.com/lists/oss-security/2011/05/10/7"}, {"source": "cve@mitre.org", "url": "http://openwall.com/lists/oss-security/2011/05/11/1"}, {"source": "cve@mitre.org", "url": "http://secunia.com/advisories/45205"}, {"source": "cve@mitre.org", "url": "http://www.debian.org/security/2011/dsa-2254"}, {"source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-1166-1"}, {"source": "cve@mitre.org", "tags": ["Exploit", "Patch"], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=700883"}, {"source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67979"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit"], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=624212"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://openwall.com/lists/oss-security/2011/05/03/1"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://openwall.com/lists/oss-security/2011/05/10/6"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"], "url": "http://openwall.com/lists/oss-security/2011/05/10/7"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://openwall.com/lists/oss-security/2011/05/11/1"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/45205"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2011/dsa-2254"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1166-1"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Patch"], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=700883"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67979"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-22"}], "source": "nvd@nist.gov", "type": "Primary"}]}