Vulnerability Description
S3QL 1.18.1 and earlier uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object in (1) common.py or (2) local.py in backends/.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| S3Ql Project | S3Ql | <= 1.18.1 |
Related Weaknesses (CWE)
References
- http://www.debian.org/security/2014/dsa-3013
- http://www.openwall.com/lists/oss-security/2014/08/28/3
- https://bitbucket.org/nikratio/s3ql/commits/091ac263809b4e8ExploitPatch
- http://www.debian.org/security/2014/dsa-3013
- http://www.openwall.com/lists/oss-security/2014/08/28/3
- https://bitbucket.org/nikratio/s3ql/commits/091ac263809b4e8ExploitPatch
FAQ
What is CVE-2014-0485?
CVE-2014-0485 is a vulnerability with a CVSS score of 7.5 (HIGH). S3QL 1.18.1 and earlier uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object in (1) common.py or (2) local.py in backends/.
How severe is CVE-2014-0485?
CVE-2014-0485 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-0485?
Check the references section above for vendor advisories and patch information. Affected products include: S3Ql Project S3Ql.