CVE-2008-5031
Published: 10 November 2008
Multiple integer overflows in Python 2.2.3 through 2.5.1, and 2.6, allow context-dependent attackers to have an unknown impact via a large integer value in the tabsize argument to the expandtabs method, as implemented by (1) the string_expandtabs function in Objects/stringobject.c and (2) the unicode_expandtabs function in Objects/unicodeobject.c. NOTE: this vulnerability reportedly exists because of an incomplete fix for CVE-2008-2315.
Priority
Status
Package | Release | Status |
---|---|---|
python2.4 Launchpad, Ubuntu, Debian |
dapper |
Released
(2.4.3-0ubuntu6.3)
|
hardy |
Released
(2.4.5-1ubuntu4.2)
|
|
intrepid |
Released
(2.4.5-5ubuntu1.1)
|
|
jaunty |
Not vulnerable
(2.4.6-1ubuntu3)
|
|
upstream |
Released
(2.4.6-1)
|
|
python2.5 Launchpad, Ubuntu, Debian |
dapper |
Does not exist
|
gutsy |
Needed
(reached end-of-life)
|
|
hardy |
Not vulnerable
(2.5.2-2ubuntu4.1)
|
|
intrepid |
Not vulnerable
(2.5.2-11.1ubuntu1)
|
|
jaunty |
Not vulnerable
(2.5.4-1ubuntu4)
|
|
upstream |
Needs triage
|
Notes
Author | Note |
---|---|
mdeslaur | PoC: http://scary.beasts.org/security/CESA-2008-008.html |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5031
- http://scary.beasts.org/security/CESA-2008-008.html
- https://ubuntu.com/security/notices/USN-806-1
- NVD
- Launchpad
- Debian