First published: Fri Feb 28 2014(Updated: )
Buffer overflow in the socket.recvfrom_into function in Modules/socketmodule.c in Python 2.5 before 2.7.7, 3.x before 3.3.4, and 3.4.x before 3.4rc1 allows remote attackers to execute arbitrary code via a crafted string.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Python Babel Localedata | =2.5.1 | |
Python Babel Localedata | =2.5.2 | |
Python Babel Localedata | =2.5.3 | |
Python Babel Localedata | =2.5.4 | |
Python Babel Localedata | =2.5.6 | |
Python Babel Localedata | =2.5.150 | |
Python Babel Localedata | =2.6.1 | |
Python Babel Localedata | =2.6.2 | |
Python Babel Localedata | =2.6.3 | |
Python Babel Localedata | =2.6.4 | |
Python Babel Localedata | =2.6.5 | |
Python Babel Localedata | =2.6.6 | |
Python Babel Localedata | =2.6.7 | |
Python Babel Localedata | =2.6.8 | |
Python Babel Localedata | =2.6.2150 | |
Python Babel Localedata | =2.6.6150 | |
Python Babel Localedata | =2.7.1 | |
Python Babel Localedata | =2.7.1-rc1 | |
Python Babel Localedata | =2.7.2-rc1 | |
Python Babel Localedata | =2.7.3 | |
Python Babel Localedata | =2.7.4 | |
Python Babel Localedata | =2.7.5 | |
Python Babel Localedata | =2.7.6 | |
Python Babel Localedata | =2.7.1150 | |
Python Babel Localedata | =2.7.1150 | |
Python Babel Localedata | =2.7.2150 | |
macOS Yosemite | <=10.10.4 | |
Python Babel Localedata | =3.0 | |
Python Babel Localedata | =3.0.1 | |
Python Babel Localedata | =3.1 | |
Python Babel Localedata | =3.1.1 | |
Python Babel Localedata | =3.1.2 | |
Python Babel Localedata | =3.1.3 | |
Python Babel Localedata | =3.1.4 | |
Python Babel Localedata | =3.1.5 | |
Python Babel Localedata | =3.1.2150 | |
Python Babel Localedata | =3.2 | |
Python Babel Localedata | =3.2-alpha | |
Python Babel Localedata | =3.2.0 | |
Python Babel Localedata | =3.2.1 | |
Python Babel Localedata | =3.2.2 | |
Python Babel Localedata | =3.2.3 | |
Python Babel Localedata | =3.2.4 | |
Python Babel Localedata | =3.2.5 | |
Python Babel Localedata | =3.2.2150 | |
Python Babel Localedata | =3.3 | |
Python Babel Localedata | =3.3-beta2 | |
Python Babel Localedata | =3.3.0 | |
Python Babel Localedata | =3.3.1 | |
Python Babel Localedata | =3.3.2 | |
Python Babel Localedata | =3.3.3 | |
Python Babel Localedata | =3.4-alpha1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-1912 has been assigned a high severity rating due to its potential to allow remote code execution.
To fix CVE-2014-1912, upgrade Python to a version that is patched, such as 2.7.7 or later, or 3.3.4 or later.
CVE-2014-1912 affects multiple versions of Python 2.5 through 2.7, as well as Python 3.x up to 3.4rc1.
Remote attackers can exploit CVE-2014-1912 by sending crafted input to applications using vulnerable versions of Python.
Yes, there are known exploits for CVE-2014-1912 that have been demonstrated in the wild.