Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2014-2331

Опубликовано: 31 авг. 2015
Источник: ubuntu
Приоритет: medium
CVSS2: 8.5

Описание

Check_MK 1.2.2p2, 1.2.2p3, and 1.2.3i5 allows remote authenticated users to execute arbitrary Python code via a crafted rules.mk file in a snapshot. NOTE: this can be exploited by remote attackers by leveraging CVE-2014-2330.

РелизСтатусПримечание
devel

not-affected

esm-apps/xenial

not-affected

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [1.2.2p3-1]]
precise

ignored

end of life
precise/esm

DNE

precise was needed
trusty

not-affected

1.2.2p3-1
trusty/esm

DNE

trusty was not-affected [1.2.2p3-1]
upstream

released

1.2.2p3-1
vivid

not-affected

vivid/stable-phone-overlay

DNE

Показывать по

8.5 High

CVSS2

Связанные уязвимости

nvd
больше 10 лет назад

Check_MK 1.2.2p2, 1.2.2p3, and 1.2.3i5 allows remote authenticated users to execute arbitrary Python code via a crafted rules.mk file in a snapshot. NOTE: this can be exploited by remote attackers by leveraging CVE-2014-2330.

debian
больше 10 лет назад

Check_MK 1.2.2p2, 1.2.2p3, and 1.2.3i5 allows remote authenticated use ...

github
больше 3 лет назад

Check_MK 1.2.2p2, 1.2.2p3, and 1.2.3i5 allows remote authenticated users to execute arbitrary Python code via a crafted rules.mk file in a snapshot. NOTE: this can be exploited by remote attackers by leveraging CVE-2014-2330.

8.5 High

CVSS2