Debian DSA-1667-1 : python2.4 - several vulnerabilities

High Nessus Plugin ID 34823

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 5.9

Synopsis

The remote Debian host is missing a security-related update.

Description

Several vulnerabilities have been discovered in the interpreter for the Python language. The Common Vulnerabilities and Exposures project identifies the following problems :

- CVE-2008-2315 David Remahl discovered several integer overflows in the stringobject, unicodeobject, bufferobject, longobject, tupleobject, stropmodule, gcmodule, and mmapmodule modules.

- CVE-2008-3142 Justin Ferguson discovered that incorrect memory allocation in the unicode_resize() function can lead to buffer overflows.

- CVE-2008-3143 Several integer overflows were discovered in various Python core modules.

- CVE-2008-3144 Several integer overflows were discovered in the PyOS_vsnprintf() function.

Solution

Upgrade the python2.4 packages.

For the stable distribution (etch), these problems have been fixed in version 2.4.4-3+etch2.

See Also

https://security-tracker.debian.org/tracker/CVE-2008-2315

https://security-tracker.debian.org/tracker/CVE-2008-3142

https://security-tracker.debian.org/tracker/CVE-2008-3143

https://security-tracker.debian.org/tracker/CVE-2008-3144

https://www.debian.org/security/2008/dsa-1667

Plugin Details

Severity: High

ID: 34823

File Name: debian_DSA-1667.nasl

Version: 1.12

Type: local

Agent: unix

Published: 2008/11/21

Updated: 2019/08/02

Dependencies: 12634

Risk Information

Risk Factor: High

VPR Score: 5.9

CVSS v2.0

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:python2.4, cpe:/o:debian:debian_linux:4.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Patch Publication Date: 2008/11/19

Reference Information

CVE: CVE-2008-2315, CVE-2008-3142, CVE-2008-3143, CVE-2008-3144

DSA: 1667

CWE: 119, 189