CVE-2014-3539

NameCVE-2014-3539
Descriptionbase/oi/doa.py in the Rope library in CPython (aka Python) allows remote attackers to execute arbitrary code by leveraging an unsafe call to pickle.load.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severityhigh (attack range: remote)
Debian Bugs777525

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
rope (PTS)jessie0.10.2-1vulnerable
stretch0.10.3-1fixed
buster, sid0.10.5-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
ropesource(unstable)0.10.3-1high777525

Notes

[jessie] - rope <no-dsa> (Minor issue)
[squeeze] - rope <no-dsa> (Minor issue)
[wheezy] - rope <no-dsa> (Minor issue)
https://bugzilla.redhat.com/show_bug.cgi?id=1116485
https://github.com/python-rope/rope/issues/105
0.10.3-1 only adds a mitigation for the issue, so not completely fixed.
Still mark it as fixed in this version because patch limits socket
connections to localhost only

Search for package or bug name: Reporting problems