First published: Tue Oct 19 2010(Updated: )
The asyncore module in Python before 3.2 does not properly handle unsuccessful calls to the accept function, and does not have accompanying documentation describing how daemon applications should handle unsuccessful calls to the accept function, which makes it easier for remote attackers to conduct denial of service attacks that terminate these applications via network connections.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Python Babel Localedata | <=2.7 | |
Python Babel Localedata | >=3.0<3.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-3492 is considered a moderate severity vulnerability due to its potential impact on daemon applications.
To fix CVE-2010-3492, upgrade to Python version 3.2 or later, where the issue has been resolved.
CVE-2010-3492 affects Python versions before 3.2, specifically up to 2.7 and from 3.0 to 3.1.2.
Daemon applications that rely on the asyncore module for handling network connections are vulnerable to CVE-2010-3492.
Yes, CVE-2010-3492 can be exploited by remote attackers to conduct potentially harmful actions on affected applications.