CVE-2012-4406

OpenStack Object Storage (swift) before 1.7.0 uses the loads function in the pickle Python module unsafely when storing and loading metadata in memcached, which allows remote attackers to execute arbitrary code via a crafted pickle object.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openstack:swift:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:redhat:gluster_storage_management_console:2.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:gluster_storage_server_for_on-premise:2.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:storage:2.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:storage_for_public_cloud:2.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2012-10-22 23:55

Updated : 2024-01-25 02:13


NVD link : CVE-2012-4406

Mitre link : CVE-2012-4406

CVE.ORG link : CVE-2012-4406


JSON object : View

Products Affected

redhat

  • storage
  • enterprise_linux_server
  • gluster_storage_management_console
  • storage_for_public_cloud
  • gluster_storage_server_for_on-premise

openstack

  • swift

fedoraproject

  • fedora
CWE
CWE-502

Deserialization of Untrusted Data