Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2018-7889

Опубликовано: 08 мар. 2018
Источник: ubuntu
Приоритет: medium
EPSS Средний
CVSS2: 6.8
CVSS3: 7.8

Описание

gui2/viewer/bookmarkmanager.py in Calibre 3.18 calls cPickle.load on imported bookmark data, which allows remote attackers to execute arbitrary code via a crafted .pickle file, as demonstrated by Python code that contains an os.system call.

РелизСтатусПримечание
artful

ignored

end of life
bionic

not-affected

3.19.0+dfsg-1
cosmic

not-affected

3.19.0+dfsg-1
devel

not-affected

3.19.0+dfsg-1
disco

not-affected

3.19.0+dfsg-1
eoan

not-affected

3.19.0+dfsg-1
esm-apps/bionic

not-affected

3.19.0+dfsg-1
esm-apps/focal

not-affected

3.19.0+dfsg-1
esm-apps/jammy

not-affected

3.19.0+dfsg-1
esm-apps/noble

not-affected

3.19.0+dfsg-1

Показывать по

EPSS

Процентиль: 93%
0.11035
Средний

6.8 Medium

CVSS2

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
nvd
почти 8 лет назад

gui2/viewer/bookmarkmanager.py in Calibre 3.18 calls cPickle.load on imported bookmark data, which allows remote attackers to execute arbitrary code via a crafted .pickle file, as demonstrated by Python code that contains an os.system call.

CVSS3: 7.8
debian
почти 8 лет назад

gui2/viewer/bookmarkmanager.py in Calibre 3.18 calls cPickle.load on i ...

CVSS3: 7.8
github
больше 3 лет назад

gui2/viewer/bookmarkmanager.py in Calibre 3.18 calls cPickle.load on imported bookmark data, which allows remote attackers to execute arbitrary code via a crafted .pickle file, as demonstrated by Python code that contains an os.system call.

EPSS

Процентиль: 93%
0.11035
Средний

6.8 Medium

CVSS2

7.8 High

CVSS3