Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.59979
Categoría:Red Hat Local Security Checks
Título:RedHat Security Advisory RHSA-2007:1077
Resumen:NOSUMMARY
Descripción:Description:

The remote host is missing updates announced in
advisory RHSA-2007:1077.

Python is an interpreted, interactive, object-oriented programming
language.

An integer overflow flaw was discovered in the way Python's pcre module
handled certain regular expressions. If a Python application used the pcre
module to compile and execute untrusted regular expressions, it may be
possible to cause the application to crash, or allow arbitrary code
execution with the privileges of the Python interpreter. (CVE-2006-7228)

A flaw was discovered in the strxfrm() function of Python's locale module.
Strings generated by this function were not properly NULL-terminated, which
could possibly cause disclosure of data stored in the memory of a Python
application using this function. (CVE-2007-2052)

Users of Python are advised to upgrade to these updated packages, which
contain backported patches to resolve these issues.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2007-1077.html
http://www.redhat.com/security/updates/classification/#moderate

Risk factor : High

CVSS Score:
6.8

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2006-7228
20080221 VMSA-2008-0003 Moderate: Updated aacraid driver and samba and python service console updates
http://www.securityfocus.com/archive/1/488457/100/0/threaded
20080416 VMSA-2008-0007 Moderate Updated Service Console packages pcre, net-snmp, and OpenPegasus
http://www.securityfocus.com/archive/1/490917/100/0/threaded
26462
http://www.securityfocus.com/bid/26462
27582
http://secunia.com/advisories/27582
27741
http://secunia.com/advisories/27741
27773
http://secunia.com/advisories/27773
27776
http://secunia.com/advisories/27776
28027
http://secunia.com/advisories/28027
28041
http://secunia.com/advisories/28041
28050
http://secunia.com/advisories/28050
28406
http://secunia.com/advisories/28406
28414
http://secunia.com/advisories/28414
28658
http://secunia.com/advisories/28658
28714
http://secunia.com/advisories/28714
28720
http://secunia.com/advisories/28720
29032
http://secunia.com/advisories/29032
29085
http://secunia.com/advisories/29085
29785
http://secunia.com/advisories/29785
30106
http://secunia.com/advisories/30106
30155
http://secunia.com/advisories/30155
30219
http://secunia.com/advisories/30219
31124
http://secunia.com/advisories/31124
ADV-2008-0637
http://www.vupen.com/english/advisories/2008/0637
ADV-2008-1234
http://www.vupen.com/english/advisories/2008/1234/references
DSA-1570
http://www.debian.org/security/2008/dsa-1570
GLSA-200711-30
http://security.gentoo.org/glsa/glsa-200711-30.xml
GLSA-200801-02
http://security.gentoo.org/glsa/glsa-200801-02.xml
GLSA-200801-18
http://security.gentoo.org/glsa/glsa-200801-18.xml
GLSA-200801-19
http://security.gentoo.org/glsa/glsa-200801-19.xml
GLSA-200802-10
http://security.gentoo.org/glsa/glsa-200802-10.xml
GLSA-200805-11
http://security.gentoo.org/glsa/glsa-200805-11.xml
MDVSA-2008:012
http://www.mandriva.com/security/advisories?name=MDVSA-2008:012
MDVSA-2008:030
http://www.mandriva.com/security/advisories?name=MDVSA-2008:030
RHSA-2007:1059
http://www.redhat.com/support/errata/RHSA-2007-1059.html
RHSA-2007:1063
http://www.redhat.com/support/errata/RHSA-2007-1063.html
RHSA-2007:1065
http://www.redhat.com/support/errata/RHSA-2007-1065.html
RHSA-2007:1068
http://www.redhat.com/support/errata/RHSA-2007-1068.html
RHSA-2007:1076
http://www.redhat.com/support/errata/RHSA-2007-1076.html
RHSA-2007:1077
http://www.redhat.com/support/errata/RHSA-2007-1077.html
RHSA-2008:0546
http://www.redhat.com/support/errata/RHSA-2008-0546.html
SUSE-SA:2007:062
http://www.novell.com/linux/security/advisories/2007_62_pcre.html
SUSE-SA:2008:004
http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00006.html
[Security-announce] 20080221 VMSA-2008-0003 Moderate: Updated aacraid driver and samba and python service console updates
http://lists.vmware.com/pipermail/security-announce/2008/000005.html
[Security-announce] 20080415 VMSA-2008-0007 Moderate Updated Service Console packages pcre, net-snmp, and OpenPegasus
http://lists.vmware.com/pipermail/security-announce/2008/000014.html
http://bugs.gentoo.org/show_bug.cgi?id=198976
http://scary.beasts.org/security/CESA-2007-006.html
http://support.avaya.com/elmodocs2/security/ASA-2007-505.htm
http://www.pcre.org/changelog.txt
https://bugzilla.redhat.com/show_bug.cgi?id=383371
oval:org.mitre.oval:def:10810
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10810
Common Vulnerability Exposure (CVE) ID: CVE-2007-2052
BugTraq ID: 23887
http://www.securityfocus.com/bid/23887
Bugtraq: 20070521 FLEA-2007-0019-1: python (Google Search)
http://www.securityfocus.com/archive/1/469294/30/6450/threaded
Bugtraq: 20080221 VMSA-2008-0003 Moderate: Updated aacraid driver and samba and python service console updates (Google Search)
Bugtraq: 20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components (Google Search)
http://www.securityfocus.com/archive/1/507985/100/0/threaded
Debian Security Information: DSA-1551 (Google Search)
http://www.debian.org/security/2008/dsa-1551
Debian Security Information: DSA-1620 (Google Search)
http://www.debian.org/security/2008/dsa-1620
http://www.mandriva.com/security/advisories?name=MDKSA-2007:099
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11716
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8353
http://www.redhat.com/support/errata/RHSA-2008-0629.html
http://secunia.com/advisories/25190
http://secunia.com/advisories/25217
http://secunia.com/advisories/25233
http://secunia.com/advisories/25353
http://secunia.com/advisories/25787
http://secunia.com/advisories/29303
http://secunia.com/advisories/29889
http://secunia.com/advisories/31255
http://secunia.com/advisories/31492
http://secunia.com/advisories/37471
SuSE Security Announcement: SUSE-SR:2007:013 (Google Search)
http://www.novell.com/linux/security/advisories/2007_13_sr.html
http://www.trustix.org/errata/2007/0019/
http://www.ubuntu.com/usn/usn-585-1
http://www.vupen.com/english/advisories/2007/1465
http://www.vupen.com/english/advisories/2009/3316
XForce ISS Database: python-localemodule-information-disclosure(34060)
https://exchange.xforce.ibmcloud.com/vulnerabilities/34060
CopyrightCopyright (c) 2007 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.