6.5
CVSSv2

CVE-2009-0668

Published: 07/08/2009 Updated: 17/08/2017
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
VMScore: 578
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

Unspecified vulnerability in Zope Object Database (ZODB) prior to 3.8.2, when certain Zope Enterprise Objects (ZEO) database sharing is enabled, allows remote malicious users to execute arbitrary Python code via vectors involving the ZEO network protocol.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

zope zodb 3.8.0

zope zodb 3.7

zope zodb 3.2.4

zope zodb 3.1

zope zodb 3.6

zope zodb 3.5

zope zodb 3.1.1

zope zodb 2.9.11

zope zodb

zope zodb 3.3.3

zope zodb 3.2

zope zodb 2.10.9

zope zodb 3.4

zope zodb 3.4.1

zope zodb 3.3

zope zodb 2.8.11

zope zodb 2.11.4

Vendor Advisories

Debian Bug report logs - #540462 CVE-2009-0668, CVE-2009-0669 Package: zope3; Maintainer for zope3 is (unknown); Reported by: Giuseppe Iuculano <giuseppe@iuculanoit> Date: Sat, 8 Aug 2009 08:30:02 UTC Severity: serious Tags: patch, security Fixed in version 340-1+rm Done: Sandro Tosi <morph@debianorg> Bug is ...
It was discovered that the Zope Object Database (ZODB) database server (ZEO) improperly filtered certain commands when a database is shared among multiple applications or application instances A remote attacker could send malicious commands to the server and execute arbitrary code (CVE-2009-0668) ...
Several remote vulnerabilities have been discovered in the zope, a feature-rich web application server written in python, that could lead to arbitrary code execution in the worst case The Common Vulnerabilities and Exposures project identified the following problems: CVE-2009-0668 Due to a programming error an authorization method in the StorageS ...