First published: Fri Aug 01 2008(Updated: )
Integer overflow in _hashopenssl.c in the hashlib module in Python 2.5.2 and earlier might allow context-dependent attackers to defeat cryptographic digests, related to "partial hashlib hashing of data exceeding 4GB."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CPython | =2.0.1 | |
CPython | =2.5.2 | |
CPython | =2.3.7 | |
CPython | =2.4.5 | |
CPython | =1.5.2 | |
CPython | =2.5.1 | |
CPython | =1.6.1 | |
CPython | =2.1.3 | |
CPython | =2.2.3 | |
Python Babel Localedata | <=2.5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-2316 has a medium severity level due to the potential for cryptographic digest vulnerabilities.
To mitigate CVE-2008-2316, upgrade to Python version 2.6 or later, as they contain fixes for this vulnerability.
CVE-2008-2316 affects Python versions 2.5.2 and earlier, including 2.0.1, 2.1.3, 2.2.3, 2.3.7, 2.4.5, and 2.5.1.
CVE-2008-2316 may allow context-dependent attackers to exploit integer overflow vulnerabilities in cryptographic hashing.
For CVE-2008-2316, the only effective workaround is to upgrade to a secure version of Python, as no other mitigations can fully resolve the issue.