CVE-2012-4406
Publication date 22 October 2012
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
OpenStack Object Storage (swift) before 1.7.0 uses the loads function in the pickle Python module unsafely when storing and loading metadata in memcached, which allows remote attackers to execute arbitrary code via a crafted pickle object.
Status
Package | Ubuntu Release | Status |
---|---|---|
swift | ||
Notes
jdstrand
design problem which requires access to the private swift network. Memcached portion is fixed upstream but adds a configuration option that defaults to using pickle serialization since not all memcached servers understand JSON. Marking as 'low' since this requires privileged network access (per upstream)
Patch details
Package | Patch details |
---|---|
swift |
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 9.8 · Critical |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-1887-1
- OpenStack Swift vulnerabilities
- 20 June 2013