Ubuntu Security Notice (C) 2008-2016 Canonical, Inc. / NASL script (C) 2008-2016 Tenable Network Security, Inc.
The remote Ubuntu host is missing one or more security-related
It was discovered that there were new integer overflows in the imageop
module. If an attacker were able to trick a Python application into
processing a specially crafted image, they could execute arbitrary
code with user privileges. (CVE-2008-1679)
Justin Ferguson discovered that the zlib module did not correctly
handle certain archives. If an attacker were able to trick a Python
application into processing a specially crafted archive file, they
could execute arbitrary code with user privileges. (CVE-2008-1721)
Justin Ferguson discovered that certain string manipulations in Python
could be made to overflow. If an attacker were able to pass a
specially crafted string through the PyString_FromStringAndSize
function, they could execute arbitrary code with user privileges.
Multiple integer overflows were discovered in Python's core and
modules including hashlib, binascii, pickle, md5, stringobject,
unicodeobject, bufferobject, longobject, tupleobject, stropmodule,
gcmodule, and mmapmodule. If an attacker were able to exploit these
flaws they could execute arbitrary code with user privileges or cause
Python applications to crash, leading to a denial of service.
(CVE-2008-2315, CVE-2008-2316, CVE-2008-3142, CVE-2008-3143,
Note that Tenable Network Security has extracted the preceding
description block directly from the Ubuntu security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.
Update the affected packages.
Risk factor :
Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 10.0
Public Exploit Available : false
Family: Ubuntu Local Security Checks
Nessus Plugin ID: 33807 ()
CVE ID: CVE-2008-1679CVE-2008-1721CVE-2008-1887CVE-2008-2315CVE-2008-2316CVE-2008-3142CVE-2008-3143CVE-2008-3144CVE-2008-5031
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.