oss-sec mailing list archives
Re: buffer overflow in Python zlib extension module
From: "Steven M. Christey" <coley () linus mitre org>
Date: Thu, 10 Apr 2008 14:38:52 -0400 (EDT)
Cute. ====================================================== Name: CVE-2008-1721 Status: Candidate URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1721 Reference: BUGTRAQ:20080409 IOActive Security Advisory: Buffer overflow in Python zlib extension module Reference: URL:http://www.securityfocus.com/archive/1/archive/1/490690/100/0/threaded Reference: CONFIRM:http://bugs.python.org/issue2586 Reference: BID:28715 Reference: URL:http://www.securityfocus.com/bid/28715 Integer signedness error in the zlib extension module in Python 2.5.2 and earlier allows remote attackers to execute arbitrary code via a negative signed integer, which triggers insufficient memory allocation and a buffer overflow.
Current thread:
- buffer overflow in Python zlib extension module Jonathan Smith (Apr 10)
- Re: buffer overflow in Python zlib extension module Steven M. Christey (Apr 10)