Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-11041

Опубликовано: 20 мар. 2025
Источник: debian
EPSS Низкий

Описание

vllm-project vllm version v0.6.2 contains a vulnerability in the MessageQueue.dequeue() API function. The function uses pickle.loads to parse received sockets directly, leading to a remote code execution vulnerability. An attacker can exploit this by sending a malicious payload to the MessageQueue, causing the victim's machine to execute arbitrary code.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
vllmitppackage

EPSS

Процентиль: 79%
0.01251
Низкий

Связанные уязвимости

CVSS3: 2.6
redhat
11 месяцев назад

vllm-project vllm version v0.6.2 contains a vulnerability in the MessageQueue.dequeue() API function. The function uses pickle.loads to parse received sockets directly, leading to a remote code execution vulnerability. An attacker can exploit this by sending a malicious payload to the MessageQueue, causing the victim's machine to execute arbitrary code.

CVSS3: 9.8
nvd
11 месяцев назад

vllm-project vllm version v0.6.2 contains a vulnerability in the MessageQueue.dequeue() API function. The function uses pickle.loads to parse received sockets directly, leading to a remote code execution vulnerability. An attacker can exploit this by sending a malicious payload to the MessageQueue, causing the victim's machine to execute arbitrary code.

CVSS3: 9.8
github
11 месяцев назад

vLLM Deserialization of Untrusted Data vulnerability

EPSS

Процентиль: 79%
0.01251
Низкий
Уязвимость CVE-2024-11041