summaryrefslogtreecommitdiffstats
path: root/data/DTSA/advs/18-python2.2.adv
blob: 6bdb6f2558d90999bcdbd6f59be0789983f5d4be (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
source: python2.2
date: September 22, 2005
author: Micah Anderson
vuln-type: integer overflow
problem-scope: remote
debian-specifc: no
cve: CAN-2005-2491
vendor-advisory: 
testing-fix: 2.2.3dfsg-2sarge1
sid-fix: 2.2.3dfsg-4
upgrade: apt-get install python2.2

An integer overflow with a subsequent buffer overflow has been detected
in PCRE, the Perl Compatible Regular Expressions library, allowing
a remote attacker to execute arbitrary code. This code is also present in Python.
Exploiting this vulnerability requires an attacker to specify the used
regular expression.

© 2014-2024 Faster IT GmbH | imprint | privacy policy