CVE-2012-4406

OpenStack Object Storage (swift) before 1.7.0 uses the loads function in the pickle Python module unsafely when storing and loading metadata in memcached, which allows remote attackers to execute arbitrary code via a crafted pickle object.
References
Link Resource
http://lists.fedoraproject.org/pipermail/package-announce/2012-October/089472.html Mailing List
http://rhn.redhat.com/errata/RHSA-2012-1379.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2013-0691.html Not Applicable
http://www.openwall.com/lists/oss-security/2012/09/05/16 Mailing List
http://www.openwall.com/lists/oss-security/2012/09/05/4 Mailing List
http://www.securityfocus.com/bid/55420 Broken Link
https://bugs.launchpad.net/swift/+bug/1006414 Issue Tracking Patch
https://bugzilla.redhat.com/show_bug.cgi?id=854757 Issue Tracking Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/79140 Third Party Advisory VDB Entry
https://github.com/openstack/swift/commit/e1ff51c04554d51616d2845f92ab726cb0e5831a Patch
https://launchpad.net/swift/+milestone/1.7.0 Release Notes
http://lists.fedoraproject.org/pipermail/package-announce/2012-October/089472.html Mailing List
http://rhn.redhat.com/errata/RHSA-2012-1379.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2013-0691.html Not Applicable
http://www.openwall.com/lists/oss-security/2012/09/05/16 Mailing List
http://www.openwall.com/lists/oss-security/2012/09/05/4 Mailing List
http://www.securityfocus.com/bid/55420 Broken Link
https://bugs.launchpad.net/swift/+bug/1006414 Issue Tracking Patch
https://bugzilla.redhat.com/show_bug.cgi?id=854757 Issue Tracking Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/79140 Third Party Advisory VDB Entry
https://github.com/openstack/swift/commit/e1ff51c04554d51616d2845f92ab726cb0e5831a Patch
https://launchpad.net/swift/+milestone/1.7.0 Release Notes
Configurations

Configuration 1 (hide)

cpe:2.3:a:openstack:swift:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:redhat:gluster_storage_management_console:2.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:gluster_storage_server_for_on-premise:2.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:storage:2.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:storage_for_public_cloud:2.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2012-10-22 23:55

Updated : 2025-04-11 00:51


NVD link : CVE-2012-4406

Mitre link : CVE-2012-4406

CVE.ORG link : CVE-2012-4406


JSON object : View

Products Affected

fedoraproject

  • fedora

openstack

  • swift

redhat

  • storage
  • gluster_storage_server_for_on-premise
  • enterprise_linux_server
  • gluster_storage_management_console
  • storage_for_public_cloud
CWE
CWE-502

Deserialization of Untrusted Data