|Category:||Debian Local Security Checks|
|Title:||Debian Security Advisory DSA 1198-1 (python2.3)|
|Summary:||Debian Security Advisory DSA 1198-1 (python2.3)|
The remote host is missing an update to python2.3
announced via advisory DSA 1198-1.
Benjamin C. Wiley Sittler discovered that the repr() of the Python
interpreter allocates insufficient memory when parsing UCS-4 Unicode
strings, which might lead to execution of arbitrary code through
a buffer overflow.
For the stable distribution (sarge) this problem has been fixed in
version 2.3.5-3sarge2. Due to build problems this update lacks fixed
packages for the Alpha and Sparc architectures. Once they are sorted
out, fixed binaries will be released.
For the unstable distribution (sid) this problem has been fixed in
We recommend that you upgrade your Python 2.3 packages.
Common Vulnerability Exposure (CVE) ID: CVE-2006-4980|
Bugtraq: 20061011 rPSA-2006-0187-1 idle python (Google Search)
Bugtraq: 20070110 VMware ESX server security updates (Google Search)
Debian Security Information: DSA-1197 (Google Search)
Debian Security Information: DSA-1198 (Google Search)
SGI Security Advisory: 20061001-01-P
SuSE Security Announcement: SUSE-SR:2006:025 (Google Search)
BugTraq ID: 20376
XForce ISS Database: python-repr-bo(29408)
|Copyright||Copyright (c) 2006 E-Soft Inc. http://www.securityspace.com|
|This is only one of 58880 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.