ID CVE-2008-2315
Summary Multiple integer overflows in Python 2.5.2 and earlier allow context-dependent attackers to have an unknown impact via vectors related to the (1) stringobject, (2) unicodeobject, (3) bufferobject, (4) longobject, (5) tupleobject, (6) stropmodule, (7) gcmodule, and (8) mmapmodule modules. NOTE: The expandtabs integer overflows in stringobject and unicodeobject in 2.5.2 are covered by CVE-2008-5031.
References
Vulnerable Configurations
  • cpe:2.3:a:python_software_foundation:python:1.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:python_software_foundation:python:1.5.2:*:*:*:*:*:*:*
  • cpe:2.3:a:python_software_foundation:python:1.6:*:*:*:*:*:*:*
    cpe:2.3:a:python_software_foundation:python:1.6:*:*:*:*:*:*:*
  • cpe:2.3:a:python_software_foundation:python:1.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:python_software_foundation:python:1.6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:python_software_foundation:python:2.0:*:*:*:*:*:*:*
    cpe:2.3:a:python_software_foundation:python:2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:python_software_foundation:python:2.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:python_software_foundation:python:2.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:python_software_foundation:python:2.1:*:*:*:*:*:*:*
    cpe:2.3:a:python_software_foundation:python:2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:python_software_foundation:python:2.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:python_software_foundation:python:2.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:python_software_foundation:python:2.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:python_software_foundation:python:2.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:python_software_foundation:python:2.1.3:*:*:*:*:*:*:*
    cpe:2.3:a:python_software_foundation:python:2.1.3:*:*:*:*:*:*:*
  • cpe:2.3:a:python_software_foundation:python:2.2:*:*:*:*:*:*:*
    cpe:2.3:a:python_software_foundation:python:2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:python_software_foundation:python:2.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:python_software_foundation:python:2.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:python_software_foundation:python:2.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:python_software_foundation:python:2.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:python_software_foundation:python:2.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:python_software_foundation:python:2.2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:python_software_foundation:python:2.3:*:*:*:*:*:*:*
    cpe:2.3:a:python_software_foundation:python:2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:python_software_foundation:python:2.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:python_software_foundation:python:2.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:python_software_foundation:python:2.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:python_software_foundation:python:2.3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:python_software_foundation:python:2.3.3:*:*:*:*:*:*:*
    cpe:2.3:a:python_software_foundation:python:2.3.3:*:*:*:*:*:*:*
  • cpe:2.3:a:python_software_foundation:python:2.3.4:*:*:*:*:*:*:*
    cpe:2.3:a:python_software_foundation:python:2.3.4:*:*:*:*:*:*:*
  • cpe:2.3:a:python_software_foundation:python:2.3.5:*:*:*:*:*:*:*
    cpe:2.3:a:python_software_foundation:python:2.3.5:*:*:*:*:*:*:*
  • cpe:2.3:a:python_software_foundation:python:2.3.6:*:*:*:*:*:*:*
    cpe:2.3:a:python_software_foundation:python:2.3.6:*:*:*:*:*:*:*
  • cpe:2.3:a:python_software_foundation:python:2.3.7:*:*:*:*:*:*:*
    cpe:2.3:a:python_software_foundation:python:2.3.7:*:*:*:*:*:*:*
  • cpe:2.3:a:python_software_foundation:python:2.4:*:*:*:*:*:*:*
    cpe:2.3:a:python_software_foundation:python:2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:python_software_foundation:python:2.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:python_software_foundation:python:2.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:python_software_foundation:python:2.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:python_software_foundation:python:2.4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:python_software_foundation:python:2.4.3:*:*:*:*:*:*:*
    cpe:2.3:a:python_software_foundation:python:2.4.3:*:*:*:*:*:*:*
  • cpe:2.3:a:python_software_foundation:python:2.4.4:*:*:*:*:*:*:*
    cpe:2.3:a:python_software_foundation:python:2.4.4:*:*:*:*:*:*:*
  • cpe:2.3:a:python_software_foundation:python:2.4.5:*:*:*:*:*:*:*
    cpe:2.3:a:python_software_foundation:python:2.4.5:*:*:*:*:*:*:*
  • cpe:2.3:a:python_software_foundation:python:2.5:*:*:*:*:*:*:*
    cpe:2.3:a:python_software_foundation:python:2.5:*:*:*:*:*:*:*
  • cpe:2.3:a:python_software_foundation:python:2.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:python_software_foundation:python:2.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:python_software_foundation:python:*:*:*:*:*:*:*:*
    cpe:2.3:a:python_software_foundation:python:*:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 11-10-2018 - 20:40)
Impact:
Exploitability:
CWE CWE-189
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
oval via4
  • accepted 2010-03-01T04:00:26.143-05:00
    class vulnerability
    contributors
    name Pai Peng
    organization Hewlett-Packard
    definition_extensions
    • comment Solaris 10 (SPARC) is installed
      oval oval:org.mitre.oval:def:1440
    • comment Solaris 10 (x86) is installed
      oval oval:org.mitre.oval:def:1926
    description Multiple integer overflows in Python 2.5.2 and earlier allow context-dependent attackers to have an unknown impact via vectors related to the (1) stringobject, (2) unicodeobject, (3) bufferobject, (4) longobject, (5) tupleobject, (6) stropmodule, (7) gcmodule, and (8) mmapmodule modules. NOTE: The expandtabs integer overflows in stringobject and unicodeobject in 2.5.2 are covered by CVE-2008-5031.
    family unix
    id oval:org.mitre.oval:def:8445
    status accepted
    submitted 2010-01-19T17:52:34.000-05:00
    title Multiple Buffer and Integer Overflow Vulnerabilities in Python (python(1)) May Lead to a Denial of Service (DoS) or Allow Execution of Arbitrary Code
    version 34
  • accepted 2014-01-20T04:01:41.604-05:00
    class vulnerability
    contributors
    • name Pai Peng
      organization Hewlett-Packard
    • name Chris Coffin
      organization The MITRE Corporation
    definition_extensions
    • comment VMWare ESX Server 3.0.3 is installed
      oval oval:org.mitre.oval:def:6026
    • comment VMware ESX Server 3.5.0 is installed
      oval oval:org.mitre.oval:def:5887
    • comment VMware ESX Server 4.0 is installed
      oval oval:org.mitre.oval:def:6293
    description Multiple integer overflows in Python 2.5.2 and earlier allow context-dependent attackers to have an unknown impact via vectors related to the (1) stringobject, (2) unicodeobject, (3) bufferobject, (4) longobject, (5) tupleobject, (6) stropmodule, (7) gcmodule, and (8) mmapmodule modules. NOTE: The expandtabs integer overflows in stringobject and unicodeobject in 2.5.2 are covered by CVE-2008-5031.
    family unix
    id oval:org.mitre.oval:def:8683
    status accepted
    submitted 2010-03-19T16:57:59.000-04:00
    title VMware python multiple integer overflows vulnerability
    version 7
  • accepted 2013-04-29T04:21:56.073-04:00
    class vulnerability
    contributors
    • name Aharon Chernin
      organization SCAP.com, LLC
    • name Dragos Prisaca
      organization G2, Inc.
    definition_extensions
    • comment The operating system installed on the system is Red Hat Enterprise Linux 3
      oval oval:org.mitre.oval:def:11782
    • comment CentOS Linux 3.x
      oval oval:org.mitre.oval:def:16651
    • comment The operating system installed on the system is Red Hat Enterprise Linux 4
      oval oval:org.mitre.oval:def:11831
    • comment CentOS Linux 4.x
      oval oval:org.mitre.oval:def:16636
    • comment Oracle Linux 4.x
      oval oval:org.mitre.oval:def:15990
    • comment The operating system installed on the system is Red Hat Enterprise Linux 5
      oval oval:org.mitre.oval:def:11414
    • comment The operating system installed on the system is CentOS Linux 5.x
      oval oval:org.mitre.oval:def:15802
    • comment Oracle Linux 5.x
      oval oval:org.mitre.oval:def:15459
    description Multiple integer overflows in Python 2.5.2 and earlier allow context-dependent attackers to have an unknown impact via vectors related to the (1) stringobject, (2) unicodeobject, (3) bufferobject, (4) longobject, (5) tupleobject, (6) stropmodule, (7) gcmodule, and (8) mmapmodule modules. NOTE: The expandtabs integer overflows in stringobject and unicodeobject in 2.5.2 are covered by CVE-2008-5031.
    family unix
    id oval:org.mitre.oval:def:9761
    status accepted
    submitted 2010-07-09T03:56:16-04:00
    title Multiple integer overflows in Python 2.5.2 and earlier allow context-dependent attackers to have an unknown impact via vectors related to the (1) stringobject, (2) unicodeobject, (3) bufferobject, (4) longobject, (5) tupleobject, (6) stropmodule, (7) gcmodule, and (8) mmapmodule modules. NOTE: The expandtabs integer overflows in stringobject and unicodeobject in 2.5.2 are covered by CVE-2008-5031.
    version 30
redhat via4
rpms
  • python-0:2.4.3-24.el5_3.6
  • python-debuginfo-0:2.4.3-24.el5_3.6
  • python-devel-0:2.4.3-24.el5_3.6
  • python-tools-0:2.4.3-24.el5_3.6
  • tkinter-0:2.4.3-24.el5_3.6
  • python-0:2.3.4-14.7.el4_8.2
  • python-debuginfo-0:2.3.4-14.7.el4_8.2
  • python-devel-0:2.3.4-14.7.el4_8.2
  • python-docs-0:2.3.4-14.7.el4_8.2
  • python-tools-0:2.3.4-14.7.el4_8.2
  • tkinter-0:2.3.4-14.7.el4_8.2
  • python-0:2.2.3-6.11
  • python-debuginfo-0:2.2.3-6.11
  • python-devel-0:2.2.3-6.11
  • python-tools-0:2.2.3-6.11
  • tkinter-0:2.2.3-6.11
refmap via4
apple APPLE-SA-2009-02-12
bid 30491
bugtraq 20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components
confirm
debian DSA-1667
gentoo GLSA-200807-16
mandriva
  • MDVSA-2008:163
  • MDVSA-2008:164
mlist
  • [oss-security] 20081105 CVE Request - Python string expandtabs
  • [oss-security] 20081105 Re: CVE Request - Python string expandtabs
secunia
  • 31305
  • 31332
  • 31358
  • 31365
  • 31518
  • 31687
  • 32793
  • 33937
  • 37471
  • 38675
slackware SSA:2008-217-01
suse SUSE-SR:2008:017
ubuntu USN-632-1
vupen
  • ADV-2008-2288
  • ADV-2009-3316
xf
  • python-modules-bo(44172)
  • python-multiple-bo(44173)
Last major update 11-10-2018 - 20:40
Published 01-08-2008 - 14:41
Last modified 11-10-2018 - 20:40
Back to Top