New Search

Multiple integer overflows in Python before 2.5.2 might allow context-dependent attackers to have an unknown impact via vectors related to (1) Include/pymem.h; (2) _csv.c (3) _struct.c (4) arraymodule.c (5) audioop.c (6) binascii.c (7) cPickle.c (8) cStringIO.c (9) cjkcodecs/multibytecodec.c (10) datetimemodule.c (11) md5.c (12) rgbimgmodule.c and (13) stropmodule.c in Modules/; (14) bufferobject.c (15) listobject.c and (16) obmalloc.c in Objects/; (17) Parser/node.c; and (18) asdl.c (19) ast.c (20) bltinmodule.c and (21) compile.c in Python/ as addressed by "checks for integer overflows contributed by Google."

oval:org.mitre.oval:def:8996

Multiple integer overflows in Python before 2.5.2 might allow context-dependent attackers to have an unknown impact via vectors related to (1) Include/pymem.h; (2) _csv.c (3) _struct.c (4) arraymodule.c (5) audioop.c (6) binascii.c (7) cPickle.c (8) cStringIO.c (9) cjkcodecs/multibytecodec.c (10) datetimemodule.c (11) md5.c (12) rgbimgmodule.c and (13) stropmodule.c in Modules/; (14) bufferobject.c (15) listobject.c and (16) obmalloc.c in Objects/; (17) Parser/node.c; and (18) asdl.c (19) ast.c (20) bltinmodule.c and (21) compile.c in Python/ as addressed by "checks for integer overflows contributed by Google."

Family:
unix
Status:
ACCEPTED
Platform(s):
  • CentOS Linux 3
  • Red Hat Enterprise Linux 3
  • Red Hat Enterprise Linux 4
  • Oracle Linux 4
  • Oracle Linux 5
  • CentOS Linux 5
  • CentOS Linux 4
  • Red Hat Enterprise Linux 5
Class:
vulnerability
Reference(s):
  • CVE-2008-3143
Product(s):