![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.1.10.2014.0085 |
Category: | Mageia Linux Local Security Checks |
Title: | Mageia: Security Advisory (MGASA-2014-0085) |
Summary: | The remote host is missing an update for the 'python, python3' package(s) announced via the MGASA-2014-0085 advisory. |
Description: | Summary: The remote host is missing an update for the 'python, python3' package(s) announced via the MGASA-2014-0085 advisory. Vulnerability Insight: Updated python and python3 packages fix security vulnerabilities: A vulnerability was reported in Python's socket module, due to a boundary error within the sock_recvfrom_into() function, which could be exploited to cause a buffer overflow. This could be used to crash a Python application that uses the socket.recvfrom_info() function or, possibly, execute arbitrary code with the permissions of the user running vulnerable Python code (CVE-2014-1912). This updates the python package to version 2.7.6, which fixes several other bugs, including denial of service flaws due to unbound readline() calls in the ftplib and nntplib modules (CVE-2013-1752). The python3 package has been patched to fix the CVE-2014-1912 issue. Affected Software/OS: 'python, python3' package(s) on Mageia 3, Mageia 4. Solution: Please install the updated package(s). CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2013-1752 Common Vulnerability Exposure (CVE) ID: CVE-2014-1912 http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html BugTraq ID: 65379 http://www.securityfocus.com/bid/65379 Debian Security Information: DSA-2880 (Google Search) http://www.debian.org/security/2014/dsa-2880 http://www.exploit-db.com/exploits/31875 https://security.gentoo.org/glsa/201503-10 http://pastebin.com/raw.php?i=GHXSmNEg https://www.trustedsec.com/february-2014/python-remote-code-execution-socket-recvfrom_into/ http://www.openwall.com/lists/oss-security/2014/02/12/16 RedHat Security Advisories: RHSA-2015:1064 http://rhn.redhat.com/errata/RHSA-2015-1064.html RedHat Security Advisories: RHSA-2015:1330 http://rhn.redhat.com/errata/RHSA-2015-1330.html http://www.securitytracker.com/id/1029831 SuSE Security Announcement: openSUSE-SU-2014:0518 (Google Search) http://lists.opensuse.org/opensuse-updates/2014-04/msg00035.html SuSE Security Announcement: openSUSE-SU-2014:0597 (Google Search) http://lists.opensuse.org/opensuse-updates/2014-05/msg00008.html http://www.ubuntu.com/usn/USN-2125-1 |
Copyright | Copyright (C) 2022 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |