First published: Thu Apr 15 2004(Updated: )
Buffer overflow in the getaddrinfo function in Python 2.2 before 2.2.2, when IPv6 support is disabled, allows remote attackers to execute arbitrary code via an IPv6 address that is obtained using DNS.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CPython | =2.2 | |
CPython | =2.2.1 | |
Python Babel Localedata | >=2.2.0<2.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0150 has a high severity rating due to the potential for remote code execution.
To fix CVE-2004-0150, upgrade Python to version 2.2.2 or later.
CVE-2004-0150 affects Python versions 2.2.0, 2.2.1, and earlier.
Attackers can exploit CVE-2004-0150 by sending a crafted IPv6 address through DNS, leading to a buffer overflow.
Yes, the vulnerability occurs when IPv6 support is disabled in the affected versions of Python.