Vulnerability Description
vllm-project vllm version v0.6.2 contains a vulnerability in the MessageQueue.dequeue() API function. The function uses pickle.loads to parse received sockets directly, leading to a remote code execution vulnerability. An attacker can exploit this by sending a malicious payload to the MessageQueue, causing the victim's machine to execute arbitrary code.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Vllm | Vllm | 0.6.2 |
Related Weaknesses (CWE)
References
- https://huntr.com/bounties/00136195-11e0-4ad0-98d5-72db066e867fExploitThird Party Advisory
FAQ
What is CVE-2024-11041?
CVE-2024-11041 is a vulnerability with a CVSS score of 9.8 (CRITICAL). vllm-project vllm version v0.6.2 contains a vulnerability in the MessageQueue.dequeue() API function. The function uses pickle.loads to parse received sockets directly, leading to a remote code execut...
How severe is CVE-2024-11041?
CVE-2024-11041 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2024-11041?
Check the references section above for vendor advisories and patch information. Affected products include: Vllm Vllm.