CVE-2012-0845
Published: 14 February 2012
SimpleXMLRPCServer.py in SimpleXMLRPCServer in Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via an XML-RPC POST request that contains a smaller amount of data than specified by the Content-Length header.
Priority
Status
Package | Release | Status |
---|---|---|
python2.4 Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
python2.5 Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
python2.6 Launchpad, Ubuntu, Debian |
Upstream |
Released
(2.6.8)
|
Patches: Upstream: http://hg.python.org/cpython/rev/24244a744d01/ |
||
python2.7 Launchpad, Ubuntu, Debian |
Upstream |
Released
(2.7.3)
|
Patches: Upstream: http://hg.python.org/cpython/rev/0c02f30b2538/ |
||
python3.1 Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Patches: Upstream: http://hg.python.org/cpython/rev/4dd5a94fd3e3/ |
||
python3.2 Launchpad, Ubuntu, Debian |
Upstream |
Released
(3.2.3)
|
Patches: Upstream: http://hg.python.org/cpython/rev/cd67740ce653/ |
Notes
Author | Note |
---|---|
jdstrand | reproducer doesn't work on 8.04 LTS python2.4, but the code is sufficiently similar that we'll patch |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0845
- https://bugzilla.redhat.com/show_bug.cgi?id=789790
- https://usn.ubuntu.com/usn/usn-1592-1
- https://usn.ubuntu.com/usn/usn-1596-1
- https://usn.ubuntu.com/usn/usn-1613-1
- https://usn.ubuntu.com/usn/usn-1613-2
- https://usn.ubuntu.com/usn/usn-1615-1
- https://usn.ubuntu.com/usn/usn-1616-1
- NVD
- Launchpad
- Debian