Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Mandrake Local Security Checks >> MDKSA-2004:019: python


Vulnerability Assessment Details

MDKSA-2004:019: python

Vulnerability Assessment Summary
Check for the version of the python package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory MDKSA-2004:019 (python).


A buffer overflow in python 2.2's getaddrinfo() function was discovered by
Sebastian Schmidt. If python 2.2 is built without IPv6 support, a possible hacker
could configure their name server to let a hostname resolve to a special IPv6
address, which could contain a memory address where shellcode is placed. This
problem does not affect python versions prior to 2.2 or versions 2.2.2+, and it
also doesn't exist if IPv6 support is enabled.
The updated packages have been patched to correct the problem. Thanks to
Sebastian for both the discovery and patch.


Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2004:019
Network Security Threat Level: High

Networks Security ID: 9836

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

Samsung 840 Pro 256GB SSD MZ-7PD256 2.5" MZ7PD256HAFV SM841 Solid State Drive
$49.98
Samsung 840 Pro 256GB SSD MZ-7PD256 2.5Samsung Dell LTN170X2-L03 FW758 17" Matte LCD Screen Tested and Working
$37.99
Samsung Dell LTN170X2-L03 FW758 17SAMSUNG S24E450D 24INCH/LED/1920X1080/250CD/M2
$191.65
SAMSUNG S24E450D 24INCH/LED/1920X1080/250CD/M2 pictureSamsung 960 EVO 250GB M.2 NVMe SSD
$60.0
Samsung 960 EVO 250GB M.2 NVMe SSD picture


Discussions

No Discussions have been posted on this vulnerability.