Lucene search

K
freebsdFreeBSD8E5E6D42-A0FA-11E3-B09A-080027F2D077
HistoryJan 14, 2014 - 12:00 a.m.

Python -- buffer overflow in socket.recvfrom_into()

2014-01-1400:00:00
vuxml.freebsd.org
16

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.53 Medium

EPSS

Percentile

97.6%

Vincent Danen via Red Hat Issue Tracker reports:

A vulnerability was reported in Python’s socket module, due to a
boundary error within the sock_recvfrom_into() function, which could be
exploited to cause a buffer overflow. This could be used to crash a
Python application that uses the socket.recvfrom_info() function or,
possibly, execute arbitrary code with the permissions of the user
running vulnerable Python code.
This vulnerable function, socket.recvfrom_into(), was introduced in
Python 2.5. Earlier versions are not affected by this flaw.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchpython27<=Β 2.7.6_3UNKNOWN
FreeBSDanynoarchpython31<=Β 3.1.5_10UNKNOWN
FreeBSDanynoarchpython32<=Β 3.2.5_7UNKNOWN
FreeBSDanynoarchpython33<=Β 3.3.3_2UNKNOWN

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.53 Medium

EPSS

Percentile

97.6%