First published: Wed Sep 05 2012(Updated: )
OpenStack Object Storage (swift) before 1.7.0 uses the loads function in the pickle Python module unsafely when storing and loading metadata in memcached, which allows remote attackers to execute arbitrary code via a crafted pickle object.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/swift | <1.7.0 | 1.7.0 |
OpenStack Swift3 | <=1.6.0 | |
OpenStack Swift3 | =1.0.0 | |
OpenStack Swift3 | =1.0.1 | |
OpenStack Swift3 | =1.0.2 | |
OpenStack Swift3 | =1.1.0 | |
OpenStack Swift3 | =1.1.0-rc1 | |
OpenStack Swift3 | =1.1.0-rc2 | |
OpenStack Swift3 | =1.2.0 | |
OpenStack Swift3 | =1.2.0-gamma1 | |
OpenStack Swift3 | =1.2.0-rc1 | |
OpenStack Swift3 | =1.3.0 | |
OpenStack Swift3 | =1.3.0-gamma1 | |
OpenStack Swift3 | =1.3.0-rc1 | |
OpenStack Swift3 | =1.4.0 | |
OpenStack Swift3 | =1.4.1 | |
OpenStack Swift3 | =1.4.2 | |
OpenStack Swift3 | =1.4.3 | |
OpenStack Swift3 | =1.4.4 | |
OpenStack Swift3 | =1.4.5 | |
OpenStack Swift3 | =1.4.6 | |
OpenStack Swift3 | =1.4.7 | |
OpenStack Swift3 | =1.4.8 | |
OpenStack Swift3 | =1.5.0 | |
OpenStack Swift3 | <1.7.0 | |
Fedora | =16 | |
Red Hat Gluster Storage Management Console | =2.0 | |
Red Hat Gluster Storage Server | =2.0 | |
Red Hat Storage | =2.0 | |
redhat Storage for public cloud | =2.0 | |
redhat enterprise Linux server | =5.0 | |
redhat enterprise Linux server | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-4406 is classified as a high-severity vulnerability due to its potential for remote code execution.
To remediate CVE-2012-4406, update the OpenStack Swift package to version 1.7.0 or later.
CVE-2012-4406 affects all versions of OpenStack Swift before 1.7.0, particularly versions 1.6.0 and earlier.
CVE-2012-4406 is a remote code execution vulnerability caused by unsafe use of the pickle module in Python.
CVE-2012-4406 was reported by Sebastian Krahmer.