Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.50660
Categoría:Mandrake Local Security Checks
Título:Mandrake Security Advisory MDKSA-2004:019 (python)
Resumen:NOSUMMARY
Descripción:Description:

The remote host is missing an update to python
announced via advisory MDKSA-2004:019.

A buffer overflow in python 2.2's getaddrinfo() function was
discovered by Sebastian Schmidt. If python 2.2 is built without
IPv6 support, an attacker could configure their name server to let a
hostname resolve to a special IPv6 address, which could contain a
memory address where shellcode is placed. This problem does not
affect python versions prior to 2.2 or versions 2.2.2+, and it also
doesn't exist if IPv6 support is enabled.

The updated packages have been patched to correct the problem. Thanks
to Sebastian for both the discovery and patch.

Affected versions: 9.0, Corporate Server 2.1

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

http://www.securityspace.com/smysecure/catid.html?in=MDKSA-2004:019
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0150

Risk factor : High

CVSS Score:
7.5

Referencia Cruzada: BugTraq ID: 9836
Common Vulnerability Exposure (CVE) ID: CVE-2004-0150
http://www.securityfocus.com/bid/9836
Debian Security Information: DSA-458 (Google Search)
http://www.debian.org/security/2004/dsa-458
http://www.gentoo.org/security/en/glsa/glsa-200409-03.xml
http://www.mandrakesoft.com/security/advisories?name=MDKSA-2004:019
http://www.osvdb.org/4172
XForce ISS Database: python-getaddrinfo-bo(15409)
https://exchange.xforce.ibmcloud.com/vulnerabilities/15409
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.