Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.841485
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-1887-1)
Summary:The remote host is missing an update for the 'swift' package(s) announced via the USN-1887-1 advisory.
Description:Summary:
The remote host is missing an update for the 'swift' package(s) announced via the USN-1887-1 advisory.

Vulnerability Insight:
Sebastian Krahmer discovered that Swift used the loads function in the
pickle Python module when it was configured to use memcached. A remote
attacker on the same network as memcached could exploit this to execute
arbitrary code. This update adds a new memcache_serialization_support
option to support secure json serialization. For details on this new
option, please see /usr/share/doc/swift-proxy/memcache.conf-sample. This
issue only affected Ubuntu 12.04 LTS. (CVE-2012-4406)

Alex Gaynor discovered that Swift did not safely generate XML. An
attacker could potentially craft an account name to generate arbitrary XML
responses to trigger vulnerabilities in software parsing Swift's XML.
(CVE-2013-2161)

Affected Software/OS:
'swift' package(s) on Ubuntu 12.04, Ubuntu 12.10, Ubuntu 13.04.

Solution:
Please install the updated package(s).

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2012-4406
55420
http://www.securityfocus.com/bid/55420
FEDORA-2012-15098
http://lists.fedoraproject.org/pipermail/package-announce/2012-October/089472.html
RHSA-2012:1379
http://rhn.redhat.com/errata/RHSA-2012-1379.html
RHSA-2013:0691
http://rhn.redhat.com/errata/RHSA-2013-0691.html
[oss-security] 20120905 CVE-Request: openstack pickle de-serialization
http://www.openwall.com/lists/oss-security/2012/09/05/4
[oss-security] 20120905 Re: CVE-Request: openstack pickle de-serialization
http://www.openwall.com/lists/oss-security/2012/09/05/16
https://bugs.launchpad.net/swift/+bug/1006414
https://bugzilla.redhat.com/show_bug.cgi?id=854757
https://github.com/openstack/swift/commit/e1ff51c04554d51616d2845f92ab726cb0e5831a
https://launchpad.net/swift/+milestone/1.7.0
openstack-swift-loads-code-exec(79140)
https://exchange.xforce.ibmcloud.com/vulnerabilities/79140
Common Vulnerability Exposure (CVE) ID: CVE-2013-2161
DSA-2737
http://www.debian.org/security/2012/dsa-2737
RHSA-2013:0993
http://rhn.redhat.com/errata/RHSA-2013-0993.html
[oss-security] 20130613 [OSSA 2013-016] Unchecked user input in Swift XML responses (CVE-2013-2161)
http://www.openwall.com/lists/oss-security/2013/06/13/4
https://bugs.launchpad.net/swift/+bug/1183884
openSUSE-SU-2013:1146
http://lists.opensuse.org/opensuse-updates/2013-07/msg00021.html
CopyrightCopyright (C) 2013 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.