Описание
Check_MK 1.2.2p2, 1.2.2p3, and 1.2.3i5 allows remote authenticated users to execute arbitrary Python code via a crafted rules.mk file in a snapshot. NOTE: this can be exploited by remote attackers by leveraging CVE-2014-2330.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | |
| esm-apps/xenial | not-affected | |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was not-affected [1.2.2p3-1]] |
| precise | ignored | end of life |
| precise/esm | DNE | precise was needed |
| trusty | not-affected | 1.2.2p3-1 |
| trusty/esm | DNE | trusty was not-affected [1.2.2p3-1] |
| upstream | released | 1.2.2p3-1 |
| vivid | not-affected | |
| vivid/stable-phone-overlay | DNE |
Показывать по
8.5 High
CVSS2
Связанные уязвимости
Check_MK 1.2.2p2, 1.2.2p3, and 1.2.3i5 allows remote authenticated users to execute arbitrary Python code via a crafted rules.mk file in a snapshot. NOTE: this can be exploited by remote attackers by leveraging CVE-2014-2330.
Check_MK 1.2.2p2, 1.2.2p3, and 1.2.3i5 allows remote authenticated use ...
Check_MK 1.2.2p2, 1.2.2p3, and 1.2.3i5 allows remote authenticated users to execute arbitrary Python code via a crafted rules.mk file in a snapshot. NOTE: this can be exploited by remote attackers by leveraging CVE-2014-2330.
8.5 High
CVSS2