Impact
A DTrace component, dtprobed, allows the creation of arbitrary files on the system when exposed to specially crafted User‑Stated Tracing (USDT) provider names. This flaw gives an attacker the ability to write files to any location within the file system that the dtprobed process can write to, potentially enabling privilege escalation or other malicious actions. The weakness is classified as CWE‑22, indicating improper handling of absolute or relative file paths.
Affected Systems
The vulnerability applies to the Oracle Linux operating system distributed by Oracle Corporation. No specific version information is currently listed in the extracted CNA data, so all builds that contain the affected dtprobed component should be considered potentially impacted until vendor guidance is available.
Risk and Exploitability
The publicly available CVSS score for this issue is 5.5, indicating a moderate severity. The EPSS score is <1%, suggesting a low probability of exploitation in the wild. Because the vulnerability is not listed in the CISA KEV catalog, no evidence of active exploitation has been reported. Attackers would need to supply crafted USDT provider names to the dtprobed daemon, but the exact attack vector (e.g., local vs. remote) is not detailed in the advisory, so it is inferred that the flaw may require local access or interaction with the DTrace framework.
OpenCVE Enrichment