CVE
- Id
- 33260
- CVE No.
- CVE-2008-3143
- Status
- Candidate
- Description
- Multiple integer overflows in Python before 2.5.2 might allow context-dependent attackers to have an unknown impact via vectors related to (1) Include/pymem.h; (2) _csv.c, (3) _struct.c, (4) arraymodule.c, (5) audioop.c, (6) binascii.c, (7) cPickle.c, (8) cStringIO.c, (9) cjkcodecs/multibytecodec.c, (10) datetimemodule.c, (11) md5.c, (12) rgbimgmodule.c, and (13) stropmodule.c in Modules/; (14) bufferobject.c, (15) listobject.c, and (16) obmalloc.c in Objects/; (17) Parser/node.c; and (18) asdl.c, (19) ast.c, (20) bltinmodule.c, and (21) compile.c in Python/, as addressed by "checks for integer overflows, contributed by Google."
- Phase
- Assigned (20080710)
- Votes
- None (candidate not yet proposed)
- Comments
Related CVE References
Id | CVE Id | CVE No. | Reference | Actions |
---|---|---|---|---|
361962 | 33260 | CVE-2008-3143 | BUGTRAQ:20080813 rPSA-2008-0243-1 idle python | View |
361963 | 33260 | CVE-2008-3143 | URL:http://www.securityfocus.com/archive/1/archive/1/495445/100/0/threaded | View |
361964 | 33260 | CVE-2008-3143 | BUGTRAQ:20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components | View |
361965 | 33260 | CVE-2008-3143 | URL:http://www.securityfocus.com/archive/1/archive/1/507985/100/0/threaded | View |
361966 | 33260 | CVE-2008-3143 | CONFIRM:http://bugs.gentoo.org/show_bug.cgi?id=232137 | View |
361967 | 33260 | CVE-2008-3143 | CONFIRM:http://svn.python.org/view?rev=60793&view=rev | View |
361968 | 33260 | CVE-2008-3143 | CONFIRM:http://www.python.org/download/releases/2.5.2/NEWS.txt | View |
361969 | 33260 | CVE-2008-3143 | CONFIRM:http://www.python.org/download/releases/2.6/NEWS.txt | View |
361970 | 33260 | CVE-2008-3143 | CONFIRM:http://wiki.rpath.com/Advisories:rPSA-2008-0243 | View |
361971 | 33260 | CVE-2008-3143 | CONFIRM:http://www.novell.com/support/search.do?cmd=displayKC&docType=kc&externalId=InfoDocument-patchbuilder-readme5032900 | View |
361972 | 33260 | CVE-2008-3143 | CONFIRM:http://www.vmware.com/security/advisories/VMSA-2009-0016.html | View |
361973 | 33260 | CVE-2008-3143 | DEBIAN:DSA-1667 | View |
361974 | 33260 | CVE-2008-3143 | URL:http://www.debian.org/security/2008/dsa-1667 | View |
361975 | 33260 | CVE-2008-3143 | GENTOO:GLSA-200807-16 | View |
361976 | 33260 | CVE-2008-3143 | URL:http://security.gentoo.org/glsa/glsa-200807-16.xml | View |
361977 | 33260 | CVE-2008-3143 | MANDRIVA:MDVSA-2008:163 | View |
361978 | 33260 | CVE-2008-3143 | URL:http://www.mandriva.com/security/advisories?name=MDVSA-2008:163 | View |
361979 | 33260 | CVE-2008-3143 | MANDRIVA:MDVSA-2008:164 | View |
361980 | 33260 | CVE-2008-3143 | URL:http://www.mandriva.com/security/advisories?name=MDVSA-2008:164 | View |
361981 | 33260 | CVE-2008-3143 | SUSE:SUSE-SR:2008:017 | View |
361982 | 33260 | CVE-2008-3143 | URL:http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html | View |
361983 | 33260 | CVE-2008-3143 | UBUNTU:USN-632-1 | View |
361984 | 33260 | CVE-2008-3143 | URL:http://www.ubuntu.com/usn/usn-632-1 | View |
361985 | 33260 | CVE-2008-3143 | BID:30491 | View |
361986 | 33260 | CVE-2008-3143 | URL:http://www.securityfocus.com/bid/30491 | View |
361987 | 33260 | CVE-2008-3143 | OVAL:oval:org.mitre.oval:def:7720 | View |
361988 | 33260 | CVE-2008-3143 | URL:http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:7720 | View |
361989 | 33260 | CVE-2008-3143 | OVAL:oval:org.mitre.oval:def:8996 | View |
361990 | 33260 | CVE-2008-3143 | URL:http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8996 | View |
361991 | 33260 | CVE-2008-3143 | SECUNIA:32793 | View |
361992 | 33260 | CVE-2008-3143 | URL:http://secunia.com/advisories/32793 | View |
361993 | 33260 | CVE-2008-3143 | SECUNIA:37471 | View |
361994 | 33260 | CVE-2008-3143 | URL:http://secunia.com/advisories/37471 | View |
361995 | 33260 | CVE-2008-3143 | VUPEN:ADV-2008-2288 | View |
361996 | 33260 | CVE-2008-3143 | URL:http://www.vupen.com/english/advisories/2008/2288 | View |
361997 | 33260 | CVE-2008-3143 | SECUNIA:31332 | View |
361998 | 33260 | CVE-2008-3143 | URL:http://secunia.com/advisories/31332 | View |
361999 | 33260 | CVE-2008-3143 | SECUNIA:31365 | View |
362000 | 33260 | CVE-2008-3143 | URL:http://secunia.com/advisories/31365 | View |
362001 | 33260 | CVE-2008-3143 | SECUNIA:31518 | View |
362002 | 33260 | CVE-2008-3143 | URL:http://secunia.com/advisories/31518 | View |
362003 | 33260 | CVE-2008-3143 | SECUNIA:31687 | View |
362004 | 33260 | CVE-2008-3143 | URL:http://secunia.com/advisories/31687 | View |
362005 | 33260 | CVE-2008-3143 | SECUNIA:31473 | View |
362006 | 33260 | CVE-2008-3143 | URL:http://secunia.com/advisories/31473 | View |
362007 | 33260 | CVE-2008-3143 | VUPEN:ADV-2009-3316 | View |
Related JVN
Id | JVN No. | Title | Summary | CVE No. | CVE Id | CVSS_v2 | CVSS_v3 | JVN URL | Actions |
---|---|---|---|---|---|---|---|---|---|
50699 | JVNDB-2008-006009 | WeFi における重要な情報を取得される脆弱性 | WeFi は、診断モードが有効になっている際、(1) WEP、(2) WPA、および (3) WPA2 アクセスポイントキーを以下に格納する、および ClientWeFiLog ファイルに平文を使用するため、重要な情報を取得される脆弱性が存在します。 | CVE-2008-3147 | 33260 | 4.7 | http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-006009.html | View |