6.4
CVSSv2

CVE-2014-7185

Published: 08/10/2014 Updated: 25/10/2019
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
VMScore: 570
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P

Vulnerability Summary

Integer overflow in bufferobject.c in Python prior to 2.7.8 allows context-dependent malicious users to obtain sensitive information from process memory via a large size and offset in a "buffer" function.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

python python 2.7.1150

python python 2.7.2

python python 2.7.4

python python 2.7.5

python python 2.7.1

python python 2.7.6

python python

python python 2.7.2150

python python 2.7.3

apple mac os x

Vendor Advisories

Debian Bug report logs - #763848 CVE-2014-7185: python27: integer overflow in 'buffer' type allows reading memory Package: python27; Maintainer for python27 is Matthias Klose <doko@debianorg>; Source for python27 is src:python27 (PTS, buildd, popcon) Reported by: Henri Salo <henri@nervfi> Date: Fri, 3 Oct 201 ...
Several security issues were fixed in Python ...
An integer overflow flaw was found in the way the buffer() function handled its offset and size arguments An attacker able to control those arguments could use this flaw to disclose portions of the application memory or cause it to crash It was discovered that multiple Python standard library modules implementing network protocols (such as httpli ...
It was <a href="bugspythonorg/issue21766">discovered</a> that Python built-in module CGIHTTPServer does not properly handle URL-encoded path separators in URLs which may enable attackers to disclose a CGI script's source code or execute arbitrary scripts in the server's document root (CVE-2014-4650) Integer overflow in buffer ...
An integer overflow flaw was found in the way the buffer() function handled its offset and size arguments An attacker able to control those arguments could use this flaw to disclose portions of the application memory or cause it to crash ...