Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-7889

Опубликовано: 08 мар. 2018
Источник: debian

Описание

gui2/viewer/bookmarkmanager.py in Calibre 3.18 calls cPickle.load on imported bookmark data, which allows remote attackers to execute arbitrary code via a crafted .pickle file, as demonstrated by Python code that contains an os.system call.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
calibrefixed3.19.0+dfsg-1package
calibreno-dsastretchpackage
calibreno-dsajessiepackage
calibreno-dsawheezypackage

Примечания

  • https://bugs.launchpad.net/calibre/+bug/1753870

  • deserialization fix https://github.com/kovidgoyal/calibre/commit/aeb5b036a0bf657951756688b3c72bd68b6e4a7d

  • insufficient as import also loads configuration files, which are python executables,

  • see https://lists.debian.org/87muy0usv1.fsf@curie.anarc.at

  • The CVE assignment is specific to the issue fixed by upstream commit

  • aeb5b036a0bf657951756688b3c72bd68b6e4a7d.

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 8 лет назад

gui2/viewer/bookmarkmanager.py in Calibre 3.18 calls cPickle.load on imported bookmark data, which allows remote attackers to execute arbitrary code via a crafted .pickle file, as demonstrated by Python code that contains an os.system call.

CVSS3: 7.8
nvd
почти 8 лет назад

gui2/viewer/bookmarkmanager.py in Calibre 3.18 calls cPickle.load on imported bookmark data, which allows remote attackers to execute arbitrary code via a crafted .pickle file, as demonstrated by Python code that contains an os.system call.

CVSS3: 7.8
github
больше 3 лет назад

gui2/viewer/bookmarkmanager.py in Calibre 3.18 calls cPickle.load on imported bookmark data, which allows remote attackers to execute arbitrary code via a crafted .pickle file, as demonstrated by Python code that contains an os.system call.