9
CVSSv2

CVE-2015-5164

Published: 18/10/2017 Updated: 08/11/2017
CVSS v2 Base Score: 9 | Impact Score: 10 | Exploitability Score: 8
CVSS v3 Base Score: 7.2 | Impact Score: 5.9 | Exploitability Score: 1.2
VMScore: 801
Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C

Vulnerability Summary

The Qpid server on Red Hat Satellite 6 does not properly restrict message types, which allows remote authenticated users with administrative access on a managed content host to execute arbitrary code via a crafted message, related to a pickle processing problem in pulp.

Vulnerable Product Search on Vulmon Subscribe to Product

pulpproject qpid -

Vendor Advisories

A flaw was found in the handling of Python pickle()-encoded messages in the Qpid server on Satellite 6 The Qpid server did not properly restrict message types that can be sent from managed content hosts An attacker with administrative access to a managed content host could send arbitrary messages containing pickle()-encoded data, which would then ...