7.5
CVSSv2

CVE-2008-2315

Published: 01/08/2008 Updated: 02/08/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Multiple integer overflows in Python 2.5.2 and previous versions allow context-dependent malicious users to have an unknown impact via vectors related to the (1) stringobject, (2) unicodeobject, (3) bufferobject, (4) longobject, (5) tupleobject, (6) stropmodule, (7) gcmodule, and (8) mmapmodule modules. NOTE: The expandtabs integer overflows in stringobject and unicodeobject in 2.5.2 are covered by CVE-2008-5031.

Vulnerable Product Search on Vulmon Subscribe to Product

python python

Vendor Advisories

It was discovered that there were new integer overflows in the imageop module If an attacker were able to trick a Python application into processing a specially crafted image, they could execute arbitrary code with user privileges (CVE-2008-1679) ...
Several vulnerabilities have been discovered in the interpreter for the Python language The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2008-2315 David Remahl discovered several integer overflows in the stringobject, unicodeobject, bufferobject, longobject, tupleobject, stropmodule, gcmodule, an ...
Synopsis Moderate: python security update Type/Severity Security Advisory: Moderate Topic Updated python packages that fix multiple security issues are now availablefor Red Hat Enterprise Linux 4This update has been rated as having moderate security impact by the RedHat Security Response Team Des ...
Synopsis Moderate: python security update Type/Severity Security Advisory: Moderate Topic Updated python packages that fix multiple security issues are now availablefor Red Hat Enterprise Linux 3This update has been rated as having moderate security impact by the RedHat Security Response Team Des ...
Synopsis Moderate: python security update Type/Severity Security Advisory: Moderate Topic Updated python packages that fix multiple security issues are now availablefor Red Hat Enterprise Linux 5This update has been rated as having moderate security impact by the RedHat Security Response Team Des ...

References

CWE-190http://bugs.gentoo.org/attachment.cgi?id=159418&action=viewhttp://bugs.gentoo.org/show_bug.cgi?id=230640http://security.gentoo.org/glsa/glsa-200807-16.xmlhttp://www.mandriva.com/security/advisories?name=MDVSA-2008:164http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.525289http://secunia.com/advisories/31305http://secunia.com/advisories/31365http://www.novell.com/support/search.do?cmd=displayKC&docType=kc&externalId=InfoDocument-patchbuilder-readme5032900http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.htmlhttp://secunia.com/advisories/31358http://www.securityfocus.com/bid/30491http://secunia.com/advisories/31332http://www.ubuntu.com/usn/usn-632-1http://secunia.com/advisories/31518http://www.mandriva.com/security/advisories?name=MDVSA-2008:163http://secunia.com/advisories/31687http://www.openwall.com/lists/oss-security/2008/11/05/2http://www.openwall.com/lists/oss-security/2008/11/05/3http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.htmlhttp://secunia.com/advisories/33937http://www.debian.org/security/2008/dsa-1667http://secunia.com/advisories/32793http://support.apple.com/kb/HT3438http://www.vupen.com/english/advisories/2009/3316http://www.vmware.com/security/advisories/VMSA-2009-0016.htmlhttp://secunia.com/advisories/37471http://support.avaya.com/css/P8/documents/100074697http://secunia.com/advisories/38675http://www.vupen.com/english/advisories/2008/2288https://exchange.xforce.ibmcloud.com/vulnerabilities/44173https://exchange.xforce.ibmcloud.com/vulnerabilities/44172https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9761https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8683https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8445http://www.securityfocus.com/archive/1/507985/100/0/threadedhttps://nvd.nist.govhttps://usn.ubuntu.com/632-1/