Exploitation Summary
EIP tracks 1 public exploit for CVE-2009-4273. PoCs published by Frank Ch. Eigler.
AI-analyzed exploit summary The exploit demonstrates command injection in SystemTap's stap-client due to insufficient input sanitization. Attackers can execute arbitrary shell commands by injecting semicolons and additional commands into arguments.
Description
stap-server in SystemTap before 1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in stap command-line arguments in a request.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Frank Ch. Eigler · textremotelinux
https://www.exploit-db.com/exploits/33535
The exploit demonstrates command injection in SystemTap's stap-client due to insufficient input sanitization. Attackers can execute arbitrary shell commands by injecting semicolons and additional commands into arguments.
Classification
Working Poc 90%
Attack Type
Rce
Complexity
Trivial
Reliability
Reliable
Target:
SystemTap versions prior to 1.1
No auth needed
Prerequisites:
Network access to the target system running a vulnerable version of SystemTap
devstral-2 · analyzed Feb 16, 2026
Full analysis →
References (18)
Core 18
Core References
Patch x_refsource_confirm
http://sourceware.org/systemtap/ftp/releases/systemtap-1.1.tar.gz
Issue Tracking x_refsource_confirm
https://bugzilla.redhat.com/show_bug.cgi?id=550172
Mailing List, Third Party Advisory vendor-advisory
x_refsource_fedora
http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035201.html
Mailing List, Third Party Advisory vendor-advisory
x_refsource_fedora
http://lists.fedoraproject.org/pipermail/package-announce/2010-January/034036.html
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
http://lists.fedoraproject.org/pipermail/scm-commits/2010-February/394714.html
Mailing List, Third Party Advisory vendor-advisory
x_refsource_fedora
http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035261.html
Third Party Advisory, VDB Entry vdb-entry
signature
x_refsource_oval
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11417
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/38154
Patch vendor-advisory
x_refsource_fedora
http://lists.fedoraproject.org/pipermail/package-announce/2010-January/034041.html
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/39656
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/38216
Vendor Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2010/0169
Mailing List vendor-advisory
x_refsource_suse
http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00006.html
Patch mailing-list
x_refsource_mlist
http://sourceware.org/ml/systemtap/2010-q1/msg00142.html
Patch x_refsource_confirm
http://sourceware.org/bugzilla/show_bug.cgi?id=11105
Vendor Advisory vendor-advisory
x_refsource_redhat
http://www.redhat.com/support/errata/RHSA-2010-0124.html
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/38765
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2010/1001
Scores
EPSS
0.2240
EPSS Percentile
95.9%
Details
CWE
CWE-94
Status
published
Products (25)
systemtap/systemtap
0.2.2
systemtap/systemtap
0.3
systemtap/systemtap
0.4
systemtap/systemtap
0.5
systemtap/systemtap
0.5.3
systemtap/systemtap
0.5.4
systemtap/systemtap
0.5.5
systemtap/systemtap
0.5.7
systemtap/systemtap
0.5.8
systemtap/systemtap
0.5.9
... and 15 more
Published
Jan 26, 2010
Tracked Since
Feb 18, 2026