Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> Mandrake Local Security Checks >> MDKSA-2002:082-1: python

Vulnerability Assessment Details

MDKSA-2002:082-1: python

Vulnerability Assessment Summary
Check for the version of the python package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory MDKSA-2002:082-1 (python).

A vulnerability was discovered in python by Zack Weinberg in the way that the
execvpe() method from the module uses a temporary file name. The file is
created in an unsafe manner and execvpe() tries to execute it, which can be used
by a local attacker to execute arbitrary code with the privilege of the user
running the python code that is using this method.
The previously released packages for 9.0 had an incorrect dependency on instead of This update corrects that problem.

Solution :
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

Prowrite - 1988 - Commodore Amiga
Prowrite - 1988 - Commodore Amiga pictureADP - Professional Conversion Pack Ver 2.0 ASDG Inc - 1993 - Commodore Amiga - 2
ADP - Professional Conversion Pack Ver 2.0 ASDG Inc - 1993 - Commodore Amiga - 2 pictureCommodore Amiga Wolf Pack Software and Manual MIB
Commodore Amiga Wolf Pack Software and Manual MIB pictureScribble Platinum Edition - 1989 - Commodore Amiga
Scribble Platinum Edition - 1989 - Commodore Amiga picture


No Discussions have been posted on this vulnerability.