First published: Tue Sep 02 2014(Updated: )
The wato component in Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, related to an automation URL.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Check Mk Project Check Mk | <=1.2.4 | |
Check Mk Project Check Mk | =1.2.4 | |
Check Mk Project Check Mk | =1.2.4-p1 | |
Check Mk Project Check Mk | =1.2.4-p2 | |
Check Mk Project Check Mk | =1.2.5-i1 | |
Check Mk Project Check Mk | =1.2.5-i2 | |
Check Mk Project Check Mk | =1.2.5-i3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.