CVE-2009-4273

stap-server <1.1 - Command Injection

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2009-4273. PoCs published by Frank Ch. Eigler.

AI-analyzed exploit summary The exploit demonstrates command injection in SystemTap's stap-client due to insufficient input sanitization. Attackers can execute arbitrary shell commands by injecting semicolons and additional commands into arguments.

Description

stap-server in SystemTap before 1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in stap command-line arguments in a request.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Frank Ch. Eigler · textremotelinux
https://www.exploit-db.com/exploits/33535

The exploit demonstrates command injection in SystemTap's stap-client due to insufficient input sanitization. Attackers can execute arbitrary shell commands by injecting semicolons and additional commands into arguments.

Classification
Working Poc 90%
Attack Type
Rce
Complexity
Trivial
Reliability
Reliable
Target: SystemTap versions prior to 1.1
No auth needed
Prerequisites: Network access to the target system running a vulnerable version of SystemTap
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (18)

Core 18
Core References
Issue Tracking x_refsource_confirm
https://bugzilla.redhat.com/show_bug.cgi?id=550172
Mailing List, Third Party Advisory vendor-advisory x_refsource_fedora
http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035201.html
Mailing List, Third Party Advisory vendor-advisory x_refsource_fedora
http://lists.fedoraproject.org/pipermail/package-announce/2010-January/034036.html
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
http://lists.fedoraproject.org/pipermail/scm-commits/2010-February/394714.html
Mailing List, Third Party Advisory vendor-advisory x_refsource_fedora
http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035261.html
Third Party Advisory, VDB Entry vdb-entry signature x_refsource_oval
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11417
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/38154
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/39656
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/38216
Vendor Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2010/0169
Patch mailing-list x_refsource_mlist
http://sourceware.org/ml/systemtap/2010-q1/msg00142.html
Vendor Advisory vendor-advisory x_refsource_redhat
http://www.redhat.com/support/errata/RHSA-2010-0124.html
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/38765
Third Party Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2010/1001

Scores

EPSS 0.2240
EPSS Percentile 95.9%

Details

CWE
CWE-94
Status published
Products (25)
systemtap/systemtap 0.2.2
systemtap/systemtap 0.3
systemtap/systemtap 0.4
systemtap/systemtap 0.5
systemtap/systemtap 0.5.3
systemtap/systemtap 0.5.4
systemtap/systemtap 0.5.5
systemtap/systemtap 0.5.7
systemtap/systemtap 0.5.8
systemtap/systemtap 0.5.9
... and 15 more
Published Jan 26, 2010
Tracked Since Feb 18, 2026