First published: Fri Apr 18 2008(Updated: )
Python 2.5.2 and earlier allows context-dependent attackers to execute arbitrary code via multiple vectors that cause a negative size value to be provided to the PyString_FromStringAndSize function, which allocates less memory than expected when assert() is disabled and triggers a buffer overflow.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Python Babel Localedata | <=2.5.2 | |
Ubuntu Linux | =6.06 | |
Ubuntu Linux | =7.04 | |
Ubuntu Linux | =7.10 | |
Ubuntu Linux | =8.04 | |
Debian GNU/Linux | =4.0 | |
Maxthon | <=2.5.2 | |
Ubuntu | =7.04 | |
Ubuntu | =7.10 | |
Ubuntu | =8.04 | |
Ubuntu | =6.06 | |
Debian | =4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-1887 is classified as a critical vulnerability due to its potential to allow arbitrary code execution.
To fix CVE-2008-1887, upgrade Python to version 2.5.3 or later, or apply relevant patches provided by your operating system.
CVE-2008-1887 affects Python versions up to 2.5.2 and specific Ubuntu and Debian Linux distributions.
Exploiting CVE-2008-1887 can lead to a buffer overflow, potentially allowing attackers to execute arbitrary code on the affected system.
While CVE-2008-1887 primarily affects outdated software, it is still relevant for environments using legacy systems that have not been updated.