The wato component in Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, related to an automation URL.
The MITRE CVE dictionary describes this issue as:
Find out more about CVE-2014-5340 from the MITRE CVE dictionary dictionary and NIST NVD.
Base Score | 7.5 |
---|---|
Base Metrics | AV:N/AC:L/Au:N/C:P/I:P/A:P |
Access Vector | Network |
Access Complexity | Low |
Authentication | None |
Confidentiality Impact | Partial |
Integrity Impact | Partial |
Availability Impact | Partial |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Errata | Release Date |
---|---|---|
Red Hat Gluster Storage Nagios 3.1 on RHEL-6 (check-mk) | RHSA-2015:1495 | 2015-07-29 |
Red Hat Storage Native Client for Red Hat Enterprise Linux 5 (glusterfs) | RHSA-2015:1495 | 2015-07-29 |
Red Hat Gluster Storage Server 3.1 on RHEL-6 | RHSA-2015:1495 | 2015-07-29 |
Red Hat Gluster Storage NFS 3.1 on RHEL-6 (nfs-ganesha) | RHSA-2015:1495 | 2015-07-29 |
Red Hat Storage Native Client for Red Hat Enterprise Linux 6 (glusterfs) | RHSA-2015:1495 | 2015-07-29 |
Red Hat Gluster 3 Samba on RHEL-6 (libtalloc) | RHSA-2015:1495 | 2015-07-29 |
Platform | Package | State |
---|---|---|
Red Hat Gluster Storage 3.0 | check-mk | Affected |