First published: Thu Apr 10 2008(Updated: )
Integer signedness error in the zlib extension module in Python 2.5.2 and earlier allows remote attackers to execute arbitrary code via a negative signed integer, which triggers insufficient memory allocation and a buffer overflow.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Python Babel Localedata | >=2.4.0<2.4.6 | |
Python Babel Localedata | >=2.5.0<=2.5.2 | |
Debian GNU/Linux | =4.0 | |
Ubuntu Linux | =7.04 | |
Ubuntu Linux | =7.10 | |
Ubuntu Linux | =8.04 | |
Ubuntu Linux | =6.06 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-1721 is considered a critical vulnerability due to the potential for arbitrary code execution.
To fix CVE-2008-1721, upgrade to Python version 2.5.3 or later to address the integer signedness error.
CVE-2008-1721 affects Python versions 2.5.2 and earlier, as well as certain Debian and Ubuntu distributions.
CVE-2008-1721 is an integer signedness error that leads to a buffer overflow.
Yes, CVE-2008-1721 can be exploited remotely, allowing attackers to execute arbitrary code.