First published: Mon May 31 2010(Updated: )
Common Vulnerabilities and Exposures assigned an identifier <a href="https://access.redhat.com/security/cve/CVE-2010-2089">CVE-2010-2089</a> to the following vulnerability: The audioop module in Python 2.7 and 3.2 does not verify the relationships between size arguments and byte string lengths, which allows context-dependent attackers to cause a denial of service (memory corruption and application crash) via crafted arguments, as demonstrated by a call to audioop.reverse with a one-byte string, a different vulnerability than <a href="https://access.redhat.com/security/cve/CVE-2010-1634">CVE-2010-1634</a>. References: [1] <a href="http://bugs.python.org/issue7673">http://bugs.python.org/issue7673</a> Public PoC (from [1]): $ python -c "import audioop; audioop.reverse('X', 2)" Fatal Python error: Inconsistent interned string state. Abandon
Affected Software | Affected Version | How to fix |
---|---|---|
Python 2.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-598197 is classified as a moderate severity vulnerability.
To fix REDHAT-BUG-598197, update your Python installation to a version that addresses the vulnerability.
REDHAT-BUG-598197 affects Python versions 2.7 and 3.2.
REDHAT-BUG-598197 is a vulnerability in the audioop module related to improper verification of size arguments.
Yes, exploitation of REDHAT-BUG-598197 can lead to potential denial of service and arbitrary code execution.