Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2008-1721
Analyzed
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-10 Apr, 2008 | 19:05
Updated At-05 Jul, 2022 | 18:43

Integer signedness error in the zlib extension module in Python 2.5.2 and earlier allows remote attackers to execute arbitrary code via a negative signed integer, which triggers insufficient memory allocation and a buffer overflow.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.07.5HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
CPE Matches

Python Software Foundation
python
>>python>>Versions from 2.4.0(inclusive) to 2.4.6(exclusive)
cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
Python Software Foundation
python
>>python>>Versions from 2.5.0(inclusive) to 2.5.2(inclusive)
cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
Debian GNU/Linux
debian
>>debian_linux>>4.0
cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
Canonical Ltd.
canonical
>>ubuntu_linux>>6.06
cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
Canonical Ltd.
canonical
>>ubuntu_linux>>7.04
cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
Canonical Ltd.
canonical
>>ubuntu_linux>>7.10
cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
Canonical Ltd.
canonical
>>ubuntu_linux>>8.04
cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
Weaknesses
CWE IDTypeSource
CWE-681Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

Organization : Red Hat
Last Modified : 2008-04-15T00:00:00

Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=442005 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/

References
HyperlinkSourceResource
http://bugs.python.org/issue2586cve@mitre.org
Issue Tracking
Vendor Advisory
http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.htmlcve@mitre.org
Mailing List
Third Party Advisory
http://secunia.com/advisories/29889cve@mitre.org
Not Applicable
http://secunia.com/advisories/29955cve@mitre.org
Not Applicable
http://secunia.com/advisories/30872cve@mitre.org
Not Applicable
http://secunia.com/advisories/31255cve@mitre.org
Not Applicable
http://secunia.com/advisories/31358cve@mitre.org
Not Applicable
http://secunia.com/advisories/31365cve@mitre.org
Not Applicable
http://secunia.com/advisories/33937cve@mitre.org
Not Applicable
http://secunia.com/advisories/37471cve@mitre.org
Not Applicable
http://secunia.com/advisories/38675cve@mitre.org
Not Applicable
http://security.gentoo.org/glsa/glsa-200807-01.xmlcve@mitre.org
Third Party Advisory
http://securityreason.com/securityalert/3802cve@mitre.org
Exploit
Third Party Advisory
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.525289cve@mitre.org
Third Party Advisory
http://support.apple.com/kb/HT3438cve@mitre.org
Third Party Advisory
http://support.avaya.com/css/P8/documents/100074697cve@mitre.org
Third Party Advisory
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0149cve@mitre.org
Broken Link
http://www.debian.org/security/2008/dsa-1551cve@mitre.org
Third Party Advisory
http://www.debian.org/security/2008/dsa-1620cve@mitre.org
Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2008:085cve@mitre.org
Permissions Required
http://www.securityfocus.com/archive/1/490690/100/0/threadedcve@mitre.org
Third Party Advisory
VDB Entry
http://www.securityfocus.com/archive/1/507985/100/0/threadedcve@mitre.org
Third Party Advisory
VDB Entry
http://www.securityfocus.com/bid/28715cve@mitre.org
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1019823cve@mitre.org
Broken Link
Third Party Advisory
VDB Entry
http://www.ubuntu.com/usn/usn-632-1cve@mitre.org
Third Party Advisory
http://www.vmware.com/security/advisories/VMSA-2009-0016.htmlcve@mitre.org
Third Party Advisory
http://www.vupen.com/english/advisories/2008/1229/referencescve@mitre.org
Permissions Required
http://www.vupen.com/english/advisories/2009/3316cve@mitre.org
Permissions Required
https://exchange.xforce.ibmcloud.com/vulnerabilities/41748cve@mitre.org
Third Party Advisory
VDB Entry
https://issues.rpath.com/browse/RPL-2444cve@mitre.org
Broken Link
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8249cve@mitre.org
Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8494cve@mitre.org
Broken Link
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9407cve@mitre.org
Third Party Advisory
Change History
0Changes found

Details not found