scripts/amsvis/powerpcAMS/amsnet.py in powerpc-utils-python uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object.
References
Configurations
History
21 Nov 2024, 02:18
Type | Values Removed | Values Added |
---|---|---|
References | () http://rhn.redhat.com/errata/RHSA-2016-2607.html - | |
References | () http://sourceforge.net/p/powerpc-utils/mailman/message/32884230/ - Vendor Advisory | |
References | () http://www.openwall.com/lists/oss-security/2015/02/09/4 - | |
References | () http://www.securityfocus.com/bid/72537 - | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1073139 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/100788 - |
Information
Published : 2015-02-19 15:59
Updated : 2024-11-21 02:18
NVD link : CVE-2014-8165
Mitre link : CVE-2014-8165
CVE.ORG link : CVE-2014-8165
JSON object : View
Products Affected
powerpc-utils_project
- powerpc-utils
CWE
CWE-345
Insufficient Verification of Data Authenticity