{ "id": "CVE-2009-0668", "sourceIdentifier": "cve@mitre.org", "published": "2009-08-07T19:30:00.203", "lastModified": "2024-11-21T01:00:39.127", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Zope Object Database (ZODB) before 3.8.2, when certain Zope Enterprise Objects (ZEO) database sharing is enabled, allows remote attackers to execute arbitrary Python code via vectors involving the ZEO network protocol." }, { "lang": "es", "value": "Vulnerabilidad no especificada en Zope Object Database (ZODB) anterior a v3.8.2, cuando ciertos Zope Enterprise Objects (ZEO) habilitan compartir base de datos, permite a atacantes remotos ejecutar c\u00f3digo Python arbitrario a trav\u00e9s de vectores relaccionados con el protocolo de red ZEO." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": true, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-94" }, { "lang": "en", "value": "NVD-CWE-noinfo" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:zope:zodb:*:*:*:*:*:*:*:*", "versionEndIncluding": "3.8.1", "matchCriteriaId": "F9A7E1A6-8B87-43C2-A202-7383687A20B5" }, { "vulnerable": true, "criteria": "cpe:2.3:a:zope:zodb:2.8.11:*:*:*:*:*:*:*", "matchCriteriaId": "AC8B7904-4F44-4641-9275-D995ADDA0ADA" }, { "vulnerable": true, "criteria": "cpe:2.3:a:zope:zodb:2.9.11:*:*:*:*:*:*:*", "matchCriteriaId": "E70191DA-A946-495D-A2CA-5DA5735B116F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:zope:zodb:2.10.9:*:*:*:*:*:*:*", "matchCriteriaId": "4FB7982D-2F76-4237-8BBB-A4E5ADE1D497" }, { "vulnerable": true, "criteria": "cpe:2.3:a:zope:zodb:2.11.4:*:*:*:*:*:*:*", "matchCriteriaId": "3A461879-EF34-4817-8EBB-1FE7A73E03C9" }, { "vulnerable": true, "criteria": "cpe:2.3:a:zope:zodb:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "3BF6448E-3BD4-4A3D-9D58-C39928F4FB93" }, { "vulnerable": true, "criteria": "cpe:2.3:a:zope:zodb:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "E0CB7404-734F-4838-AAEE-A5D5E987EBA8" }, { "vulnerable": true, "criteria": "cpe:2.3:a:zope:zodb:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "64DF8BD4-31DC-44A5-944C-AA9AE57CBB9B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:zope:zodb:3.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "3D3CB7CF-91FC-4B7F-BD38-2F5033C70B99" }, { "vulnerable": true, "criteria": "cpe:2.3:a:zope:zodb:3.3:*:*:*:*:*:*:*", "matchCriteriaId": "D05A4183-CCE7-4BE2-B8E5-10FC33ABDEA4" }, { "vulnerable": true, "criteria": "cpe:2.3:a:zope:zodb:3.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "02371BD4-F40F-4AA7-9214-E9FFCA80138C" }, { "vulnerable": true, "criteria": "cpe:2.3:a:zope:zodb:3.4:*:*:*:*:*:*:*", "matchCriteriaId": "B59CB22D-604D-4D9D-B7A4-E42026C7F3FA" }, { "vulnerable": true, "criteria": "cpe:2.3:a:zope:zodb:3.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "C35B0E78-B0E7-41F2-B776-B7B4AE937350" }, { "vulnerable": true, "criteria": "cpe:2.3:a:zope:zodb:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "A8B6C5C0-E10B-437D-BF3C-0847B78EFDAB" }, { "vulnerable": true, "criteria": "cpe:2.3:a:zope:zodb:3.6:*:*:*:*:*:*:*", "matchCriteriaId": "C6EF771A-6AE9-4006-A273-5B04B3EAADDD" }, { "vulnerable": true, "criteria": "cpe:2.3:a:zope:zodb:3.7:*:*:*:*:*:*:*", "matchCriteriaId": "C38116E1-459C-45A7-A995-20C8ABDCCF65" }, { "vulnerable": true, "criteria": "cpe:2.3:a:zope:zodb:3.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "8568BD1E-839A-4C78-840D-47807D207C6F" } ] } ] } ], "references": [ { "url": "http://mail.zope.org/pipermail/zope-announce/2009-August/002220.html", "source": "cve@mitre.org" }, { "url": "http://osvdb.org/56827", "source": "cve@mitre.org" }, { "url": "http://pypi.python.org/pypi/ZODB3/3.8.2#whats-new-in-zodb-3-8-2", "source": "cve@mitre.org" }, { "url": "http://secunia.com/advisories/36204", "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/36205", "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] }, { "url": "http://www.securityfocus.com/bid/35987", "source": "cve@mitre.org" }, { "url": "http://www.vupen.com/english/advisories/2009/2217", "source": "cve@mitre.org" }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52377", "source": "cve@mitre.org" }, { "url": "http://mail.zope.org/pipermail/zope-announce/2009-August/002220.html", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://osvdb.org/56827", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://pypi.python.org/pypi/ZODB3/3.8.2#whats-new-in-zodb-3-8-2", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://secunia.com/advisories/36204", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/36205", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "http://www.securityfocus.com/bid/35987", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.vupen.com/english/advisories/2009/2217", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52377", "source": "af854a3a-2127-422b-91ae-364da2661108" } ] }