Solution
Please Install the Updated Packages.
Insight
Sebastian Krahmer discovered that Swift used the loads function in the pickle Python module when it was configured to use memcached. A remote attacker on the same network as memcached could exploit this to execute arbitrary code. This update adds a new memcache_serialization_support option to support secure json serialization. For details on this new option, please see /usr/share/doc/swift-proxy/memcache.conf-sample. This issue only affected Ubuntu 12.04 LTS. (CVE-2012-4406)
Alex Gaynor discovered that Swift did not safely generate XML. An attacker could potentially craft an account name to generate arbitrary XML responses to trigger vulnerabilties in software parsing Swift's XML.
(CVE-2013-2161)
Affected
swift on Ubuntu 13.04 ,
Ubuntu 12.10 ,
Ubuntu 12.04 LTS
References
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2012-4406, CVE-2013-2161 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities