First published: Tue Oct 10 2006(Updated: )
Buffer overflow in the repr function in Python 2.3 through 2.6 before 20060822 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via crafted wide character UTF-32/UCS-4 strings to certain scripts.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CPython | =2.5_release_candidate_2 | |
CPython | =2.4.3 | |
CPython | =2.3.2 | |
CPython | =2.5_alpha_1 | |
CPython | =2.5_release_candidate_1 | |
CPython | =2.5_beta_3 | |
CPython | =2.5_beta_1 | |
CPython | =2.3.3 | |
CPython | =2.5_beta_2 | |
CPython | =2.4 | |
CPython | =2.3 | |
CPython | =2.3.5 | |
CPython | =2.3.1 | |
CPython | =2.5_final | |
CPython | =2.4.2 | |
CPython | =2.5_alpha_2 | |
CPython | =2.3.4 | |
Python Babel Localedata | <2.3.6 | |
Python Babel Localedata | >=2.4.0<2.4.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-4980 is considered a moderate severity vulnerability due to its potential to cause denial of service and execute arbitrary code.
To fix CVE-2006-4980, upgrade Python to version 2.6 or higher, which is not affected by this vulnerability.
CVE-2006-4980 affects Python versions 2.3 through 2.6 before 20060822.
CVE-2006-4980 is a buffer overflow vulnerability that may allow attackers to exploit certain scripts with crafted wide character strings.
Yes, CVE-2006-4980 can potentially lead to remote code execution through crafted input.