CVE-2007-2052

Properties

Published:
15.04.2007
Updated:
30.11.2010
Patch available:
Severity:
Medium
CVSS vector:
(AV:N/AC:L/Au:N/C:P/I:N/A:N)
Product:
python_software_foundation: python
python_software_foundation: python

Vulnerability description

Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent attackers to read portions of memory via unknown manipulations that trigger a buffer over-read due to missing null termination.

References:

CONFIRM: https://issues.rpath.com/browse/RPL-1358
CONFIRM: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=235093
VUPEN: http://www.vupen.com/english/advisories/2009/3316
CONFIRM: http://www.vmware.com/security/advisories/VMSA-2009-0016.html
TRUSTIX: http://www.trustix.org/errata/2007/0019/
BID: http://www.securityfocus.com/bid/23887
BUGTRAQ: http://www.securityfocus.com/archive/1/archive/1/507985/100/0/threaded
BUGTRAQ: http://www.securityfocus.com/archive/1/archive/1/469294/30/6450/threaded
REDHAT: http://www.redhat.com/support/errata/RHSA-2008-0629.html
REDHAT: http://www.redhat.com/support/errata/RHSA-2007-1077.html
REDHAT: http://www.redhat.com/support/errata/RHSA-2007-1076.html
CONFIRM: http://www.python.org/download/releases/2.5.1/NEWS.txt
SUSE: http://www.novell.com/linux/security/advisories/2007_13_sr.html
MANDRIVA: http://www.mandriva.com/security/advisories?name=MDKSA-2007:099
VUPEN: http://www.frsirt.com/english/advisories/2007/1465
DEBIAN: http://www.debian.org/security/2008/dsa-1620
SECUNIA: http://secunia.com/advisories/37471
SECUNIA: http://secunia.com/advisories/31492
SECUNIA: http://secunia.com/advisories/31255
SECUNIA: http://secunia.com/advisories/28050
SECUNIA: http://secunia.com/advisories/28027
SECUNIA: http://secunia.com/advisories/25787
SECUNIA: http://secunia.com/advisories/25353
SECUNIA: http://secunia.com/advisories/25233
SECUNIA: http://secunia.com/advisories/25217
SECUNIA: http://secunia.com/advisories/25190
OVAL: http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8353
OVAL: http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11716
CONFIRM: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=416934
UBUNTU: http://www.ubuntu.com/usn/usn-585-1
BUGTRAQ: http://www.securityfocus.com/archive/1/archive/1/488457/100/0/threaded
VUPEN: http://www.frsirt.com/english/advisories/2008/0637
DEBIAN: http://www.debian.org/security/2008/dsa-1551
SECUNIA: http://secunia.com/advisories/29889
SECUNIA: http://secunia.com/advisories/29303
SECUNIA: http://secunia.com/advisories/29032
MLIST: http://lists.vmware.com/pipermail/security-announce/2008/000005.html