CVE-2014-8165

scripts/amsvis/powerpcAMS/amsnet.py in powerpc-utils-python uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object.
Configurations

Configuration 1 (hide)

cpe:2.3:a:powerpc-utils_project:powerpc-utils:-:*:*:*:*:*:*:*

History

21 Nov 2024, 02:18

Type Values Removed Values Added
References () http://rhn.redhat.com/errata/RHSA-2016-2607.html - () http://rhn.redhat.com/errata/RHSA-2016-2607.html -
References () http://sourceforge.net/p/powerpc-utils/mailman/message/32884230/ - Vendor Advisory () http://sourceforge.net/p/powerpc-utils/mailman/message/32884230/ - Vendor Advisory
References () http://www.openwall.com/lists/oss-security/2015/02/09/4 - () http://www.openwall.com/lists/oss-security/2015/02/09/4 -
References () http://www.securityfocus.com/bid/72537 - () http://www.securityfocus.com/bid/72537 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=1073139 - () https://bugzilla.redhat.com/show_bug.cgi?id=1073139 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/100788 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/100788 -

Information

Published : 2015-02-19 15:59

Updated : 2024-11-21 02:18


NVD link : CVE-2014-8165

Mitre link : CVE-2014-8165

CVE.ORG link : CVE-2014-8165


JSON object : View

Products Affected

powerpc-utils_project

  • powerpc-utils
CWE
CWE-345

Insufficient Verification of Data Authenticity