7.5
CVSSv2

CVE-2008-3142

Published: 01/08/2008 Updated: 05/07/2022
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Multiple buffer overflows in Python 2.5.2 and previous versions on 32bit platforms allow context-dependent malicious users to cause a denial of service (crash) or have unspecified other impact via a long string that leads to incorrect memory allocation during Unicode string processing, related to the unicode_resize function and the PyMem_RESIZE macro.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

python python

canonical ubuntu linux 7.04

canonical ubuntu linux 7.10

canonical ubuntu linux 8.04

canonical ubuntu linux 6.06

debian debian linux 4.0

Vendor Advisories

It was discovered that there were new integer overflows in the imageop module If an attacker were able to trick a Python application into processing a specially crafted image, they could execute arbitrary code with user privileges (CVE-2008-1679) ...
Synopsis Moderate: python security update Type/Severity Security Advisory: Moderate Topic Updated python packages that fix multiple security issues are now availablefor Red Hat Enterprise Linux 4This update has been rated as having moderate security impact by the RedHat Security Response Team Des ...
Synopsis Moderate: python security update Type/Severity Security Advisory: Moderate Topic Updated python packages that fix multiple security issues are now availablefor Red Hat Enterprise Linux 3This update has been rated as having moderate security impact by the RedHat Security Response Team Des ...
Synopsis Moderate: python security update Type/Severity Security Advisory: Moderate Topic Updated python packages that fix multiple security issues are now availablefor Red Hat Enterprise Linux 5This update has been rated as having moderate security impact by the RedHat Security Response Team Des ...
Several vulnerabilities have been discovered in the interpreter for the Python language The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2008-2315 David Remahl discovered several integer overflows in the stringobject, unicodeobject, bufferobject, longobject, tupleobject, stropmodule, gcmodule, an ...

References

CWE-120http://bugs.gentoo.org/show_bug.cgi?id=232137http://bugs.python.org/file10825/issue2620-gps02-patch.txthttp://bugs.python.org/issue2620http://security.gentoo.org/glsa/glsa-200807-16.xmlhttp://www.ubuntu.com/usn/usn-632-1http://secunia.com/advisories/31365http://wiki.rpath.com/Advisories:rPSA-2008-0243http://secunia.com/advisories/31518http://secunia.com/advisories/31358http://www.securityfocus.com/bid/30491http://www.mandriva.com/security/advisories?name=MDVSA-2008:164http://www.mandriva.com/security/advisories?name=MDVSA-2008:163http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.525289http://secunia.com/advisories/31305http://secunia.com/advisories/31332http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.htmlhttp://www.novell.com/support/search.do?cmd=displayKC&docType=kc&externalId=InfoDocument-patchbuilder-readme5032900http://secunia.com/advisories/31687http://secunia.com/advisories/31473http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.htmlhttp://secunia.com/advisories/33937http://secunia.com/advisories/32793http://www.debian.org/security/2008/dsa-1667http://support.apple.com/kb/HT3438http://www.vupen.com/english/advisories/2009/3316http://www.vmware.com/security/advisories/VMSA-2009-0016.htmlhttp://secunia.com/advisories/37471http://www.vupen.com/english/advisories/2008/2288https://exchange.xforce.ibmcloud.com/vulnerabilities/44173https://exchange.xforce.ibmcloud.com/vulnerabilities/44170https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8422https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11466http://www.securityfocus.com/archive/1/507985/100/0/threadedhttp://www.securityfocus.com/archive/1/495445/100/0/threadedhttps://nvd.nist.govhttps://usn.ubuntu.com/632-1/