Описание
scripts/amsvis/powerpcAMS/amsnet.py in powerpc-utils-python uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object.
scripts/amsvis/powerpcAMS/amsnet.py in powerpc-utils-python uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2014-8165
- https://access.redhat.com/errata/RHSA-2016:2607
- https://access.redhat.com/security/cve/CVE-2014-8165
- https://bugzilla.redhat.com/show_bug.cgi?id=1073139
- https://exchange.xforce.ibmcloud.com/vulnerabilities/100788
- http://rhn.redhat.com/errata/RHSA-2016-2607.html
- http://sourceforge.net/p/powerpc-utils/mailman/message/32884230
- http://www.openwall.com/lists/oss-security/2015/02/09/4
- http://www.securityfocus.com/bid/72537
Связанные уязвимости
scripts/amsvis/powerpcAMS/amsnet.py in powerpc-utils-python uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object.
scripts/amsvis/powerpcAMS/amsnet.py in powerpc-utils-python uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object.
scripts/amsvis/powerpcAMS/amsnet.py in powerpc-utils-python uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object.
scripts/amsvis/powerpcAMS/amsnet.py in powerpc-utils-python uses the p ...