First published: Fri Aug 01 2008(Updated: )
Multiple buffer overflows in Python 2.5.2 and earlier on 32bit platforms allow context-dependent attackers to cause a denial of service (crash) or have unspecified other impact via a long string that leads to incorrect memory allocation during Unicode string processing, related to the unicode_resize function and the PyMem_RESIZE macro.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Python 2.7 | <2.4.6 | |
Python 2.7 | >=2.5.0<2.5.3 | |
Ubuntu | =7.04 | |
Ubuntu | =7.10 | |
Ubuntu | =8.04 | |
Ubuntu | =6.06 | |
Debian Linux | =4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-3142 is classified as high severity due to multiple buffer overflow vulnerabilities that can lead to denial of service or other impacts.
To fix CVE-2008-3142, upgrade to Python version 2.5.3 or later, or ensure your system is using a patched version.
CVE-2008-3142 affects Python 2.5.2 and earlier, particularly on 32-bit platforms and some specific versions of Ubuntu and Debian Linux.
Yes, CVE-2008-3142 can be exploited by context-dependent attackers through specially crafted long strings.
CVE-2008-3142 can result in denial of service attacks by crashing the software, with potential for other unspecified impacts.