First published: Fri Aug 07 2009(Updated: )
Unspecified vulnerability in Zope Object Database (ZODB) before 3.8.2, when certain Zope Enterprise Objects (ZEO) database sharing is enabled, allows remote attackers to execute arbitrary Python code via vectors involving the ZEO network protocol.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/ZODB3 | <3.8.2 | 3.8.2 |
Zope ZODB | <=3.8.1 | |
Zope ZODB | =2.8.11 | |
Zope ZODB | =2.9.11 | |
Zope ZODB | =2.10.9 | |
Zope ZODB | =2.11.4 | |
Zope ZODB | =3.1 | |
Zope ZODB | =3.1.1 | |
Zope ZODB | =3.2 | |
Zope ZODB | =3.2.4 | |
Zope ZODB | =3.3 | |
Zope ZODB | =3.3.3 | |
Zope ZODB | =3.4 | |
Zope ZODB | =3.4.1 | |
Zope ZODB | =3.5 | |
Zope ZODB | =3.6 | |
Zope ZODB | =3.7 | |
Zope ZODB | =3.8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0668 has a high severity rating due to its potential to allow remote attackers to execute arbitrary Python code.
To fix CVE-2009-0668, upgrade to ZODB version 3.8.2 or later.
CVE-2009-0668 affects ZODB versions prior to 3.8.2, including versions 2.8.11 to 3.8.1.
CVE-2009-0668 exploits a vulnerability in the ZEO network protocol when certain database sharing is enabled.
A recommended workaround for CVE-2009-0668 is to disable database sharing in ZEO until the software is upgraded.