First published: Wed Sep 24 2014(Updated: )
Integer overflow in bufferobject.c in Python before 2.7.8 allows context-dependent attackers to obtain sensitive information from process memory via a large size and offset in a "buffer" function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/python | <2.7.8 | 2.7.8 |
Python Programming Language | <=2.7.7 | |
Python Programming Language | =2.7.1 | |
Python Programming Language | =2.7.1-rc1 | |
Python Programming Language | =2.7.2-rc1 | |
Python Programming Language | =2.7.3 | |
Python Programming Language | =2.7.4 | |
Python Programming Language | =2.7.5 | |
Python Programming Language | =2.7.6 | |
Python Programming Language | =2.7.1150 | |
Python Programming Language | =2.7.1150 | |
Python Programming Language | =2.7.2150 | |
macOS Yosemite | <=10.10.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-7185 is considered to have a medium severity due to the potential for sensitive information disclosure.
CVE-2014-7185 affects Python versions prior to 2.7.8.
To fix CVE-2014-7185, upgrade Python to version 2.7.8 or higher.
CVE-2014-7185 allows context-dependent attackers to exploit an integer overflow for information disclosure.
There is no known workaround for CVE-2014-7185; upgrading to a fixed version is recommended.