oss-sec mailing list archives

Re: buffer overflow in Python zlib extension module


From: "Steven M. Christey" <coley () linus mitre org>
Date: Thu, 10 Apr 2008 14:38:52 -0400 (EDT)


Cute.


======================================================
Name: CVE-2008-1721
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1721
Reference: BUGTRAQ:20080409 IOActive Security Advisory: Buffer overflow in Python zlib extension module
Reference: URL:http://www.securityfocus.com/archive/1/archive/1/490690/100/0/threaded
Reference: CONFIRM:http://bugs.python.org/issue2586
Reference: BID:28715
Reference: URL:http://www.securityfocus.com/bid/28715

Integer signedness error in the zlib extension module in Python 2.5.2
and earlier allows remote attackers to execute arbitrary code via a
negative signed integer, which triggers insufficient memory allocation
and a buffer overflow.




Current thread: