First published: Mon Nov 10 2008(Updated: )
Multiple integer overflows in Python 2.2.3 through 2.5.1, and 2.6, allow context-dependent attackers to have an unknown impact via a large integer value in the tabsize argument to the expandtabs method, as implemented by (1) the string_expandtabs function in Objects/stringobject.c and (2) the unicode_expandtabs function in Objects/unicodeobject.c. NOTE: this vulnerability reportedly exists because of an incomplete fix for CVE-2008-2315.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Python 2.7 | =2.5.1 | |
Python 2.7 | =2.4.6 | |
Python 2.7 | =2.2.3 | |
Python 2.7 | =2.3.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-5031 is classified as a moderate severity vulnerability due to the potential for integer overflow leading to unpredictable behavior in Python.
CVE-2008-5031 affects Python versions 2.2.3, 2.3.7, 2.4.6, and 2.5.1.
To mitigate the risk of CVE-2008-5031, upgrade to a version of Python later than 2.5.1, ideally to the latest stable release.
Exploitation of CVE-2008-5031 could allow attackers to execute arbitrary code or cause a denial of service through crafted input.
A potential workaround for CVE-2008-5031 is to validate and sanitize input values to the expandtabs method to avoid large integer values.