CVE-2006-4980

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Buffer overflow in the repr function in Python 2.3 through 2.6 before 20060822 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via crafted wide character UTF-32/UCS-4 strings to certain scripts.

References

ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=391589

http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=208162

http://kb.vmware.com/KanisaPlatform/Publishing/882/5120103_f.SAL_Public.html

http://secunia.com/advisories/22276

http://secunia.com/advisories/22297

http://secunia.com/advisories/22303

http://secunia.com/advisories/22357

http://secunia.com/advisories/22358

http://secunia.com/advisories/22379

http://secunia.com/advisories/22448

http://secunia.com/advisories/22487

http://secunia.com/advisories/22512

http://secunia.com/advisories/22531

http://secunia.com/advisories/22639

http://secunia.com/advisories/23680

http://secunia.com/advisories/31492

http://security.gentoo.org/glsa/glsa-200610-07.xml

http://securitytracker.com/id?1017019

http://sourceforge.net/tracker/index.php?func=detail&aid=1541585&group_id=5470&atid=305470

http://support.avaya.com/elmodocs2/security/ASA-2006-229.htm

http://www.debian.org/security/2006/dsa-1197

http://www.debian.org/security/2006/dsa-1198

http://www.mandriva.com/security/advisories?name=MDKSA-2006:181

http://www.novell.com/linux/security/advisories/2006_25_sr.html

http://www.redhat.com/support/errata/RHSA-2006-0713.html

http://www.redhat.com/support/errata/RHSA-2008-0629.html

http://www.securityfocus.com/archive/1/448244/100/100/threaded

http://www.securityfocus.com/archive/1/456546/100/200/threaded

http://www.securityfocus.com/bid/20376

http://www.ubuntu.com/usn/usn-359-1

http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html

http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html

http://www.vupen.com/english/advisories/2006/3940

http://www.vupen.com/english/advisories/2006/5131

http://zoehep.xent.com/~bsittler/python2.4-2.4.3_unicodeobject.c.diff

https://exchange.xforce.ibmcloud.com/vulnerabilities/29408

https://issues.rpath.com/browse/RPL-702

https://launchpad.net/distros/ubuntu/+source/python2.4/+bug/56633

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10789

Details

Source: MITRE

Published: 2006-10-10

Updated: 2018-10-17

Risk Information

CVSS v2

Base Score: 7.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 10

Severity: HIGH

Tenable Plugins

View all (15 total)

IDNameProductFamilySeverity
82673F5 Networks BIG-IP : Python vulnerability (K16398)NessusF5 Networks Local Security Checks
high
67414Oracle Linux 3 / 4 : python (ELSA-2006-0713)NessusOracle Linux Local Security Checks
high
43839RHEL 4 : Solaris client in Satellite Server (RHSA-2008:0629)NessusRed Hat Local Security Checks
critical
43838RHEL 3 / 4 : Solaris client in Satellite Server (RHSA-2008:0525)NessusRed Hat Local Security Checks
critical
43836RHEL 4 : Solaris client in Satellite Server (RHSA-2008:0264)NessusRed Hat Local Security Checks
critical
29559SuSE 10 Security Update : Python (ZYPP Patch Number 2167)NessusSuSE Local Security Checks
high
27939Ubuntu 5.04 / 5.10 / 6.06 LTS : python2.3, python2.4 vulnerability (USN-359-1)NessusUbuntu Local Security Checks
high
27406openSUSE 10 Security Update : python (python-2168)NessusSuSE Local Security Checks
high
24566Mandrake Linux Security Advisory : python (MDKSA-2006:181)NessusMandriva Local Security Checks
high
22907Debian DSA-1198-1 : python2.3 - buffer overflowNessusDebian Local Security Checks
high
22906Debian DSA-1197-1 : python2.4 - buffer overflowNessusDebian Local Security Checks
high
22893GLSA-200610-07 : Python: Buffer OverflowNessusGentoo Local Security Checks
high
22525RHEL 3 / 4 : python (RHSA-2006:0713)NessusRed Hat Local Security Checks
high
22521FreeBSD : python -- buffer overrun in repr() for unicode strings (fe83eb5b-55e1-11db-a5ae-00508d6a62df)NessusFreeBSD Local Security Checks
high
22514CentOS 3 / 4 : python (CESA-2006:0713)NessusCentOS Local Security Checks
high