FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2024-11-19 19:12:13 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

k68

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
fe83eb5b-55e1-11db-a5ae-00508d6a62dfpython -- buffer overrun in repr() for unicode strings

Benjamin C. Wiley Sittler reports:

I discovered a [buffer overrun in repr() for unicode strings]. This causes an unpatched non-debug wide (UTF-32/UCS-4) build of python to abort.

Ubuntu security team reports:

If an application uses repr() on arbitrary untrusted data, this [bug] could be exploited to execute arbitrary code with the privileges of the python application.


Discovery 2006-08-15
Entry 2006-10-07
Modified 2006-10-08
python+ipv6
>= 0

python
< 2.4.3_1

> 2.5.* lt 2.5.c2

CVE-2006-4980
https://launchpad.net/distros/ubuntu/+source/python2.4/+bug/56633
http://www.ubuntu.com/usn/usn-359-1
http://secunia.com/advisories/22276/
6afa87d3-764b-11d9-b0e7-0000e249a0a2python -- SimpleXMLRPCServer.py allows unrestricted traversal

According to Python Security Advisory PSF-2005-001,

The Python development team has discovered a flaw in the SimpleXMLRPCServer library module which can give remote attackers access to internals of the registered object or its module or possibly other modules. The flaw only affects Python XML-RPC servers that use the register_instance() method to register an object without a _dispatch() method. Servers using only register_function() are not affected.

On vulnerable XML-RPC servers, a remote attacker may be able to view or modify globals of the module(s) containing the registered instance's class(es), potentially leading to data loss or arbitrary code execution. If the registered object is a module, the danger is particularly serious. For example, if the registered module imports the os module, an attacker could invoke the os.system() function.

Note: This vulnerability affects your system only if you're running SimpleXMLRPCServer-based server. This isn't harmful at all if you don't run any internet server written in Python or your server doesn't serve in XML-RPC protocol.


Discovery 2005-02-03
Entry 2005-02-03
Modified 2006-10-08
python
python+ipv6
>= 2.2 lt 2.2.3_7

>= 2.3 lt 2.3.4_4

>= 2.4 lt 2.4_1

>= 2.5.a0.20050129 lt 2.5.a0.20050129_1

CVE-2005-0089
http://www.python.org/security/PSF-2005-001/