Gentoo Archives: gentoo-announce

From: Thierry Carrez <koon@g.o>
To: gentoo-announce@l.g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××.com, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200409-03 ] Python 2.2: Buffer overflow in getaddrinfo()
Date: Thu, 02 Sep 2004 20:22:01
Message-Id: 41378092.50101@gentoo.org
1 -----BEGIN PGP SIGNED MESSAGE-----
2 Hash: SHA1
3
4 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
5 Gentoo Linux Security Advisory GLSA 200409-03
6 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
7 http://security.gentoo.org/
8 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
9
10 Severity: High
11 Title: Python 2.2: Buffer overflow in getaddrinfo()
12 Date: September 02, 2004
13 Bugs: #62440
14 ID: 200409-03
15
16 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
17
18 Synopsis
19 ========
20
21 Python 2.2 has a vulnerability in DNS handling when IPV6 is disabled
22 and a malformed IPV6 address is encountered by getaddrinfo().
23
24 Background
25 ==========
26
27 Python is an interpreted, interactive, object-oriented, cross-platform
28 programming language.
29
30 Affected packages
31 =================
32
33 -------------------------------------------------------------------
34 Package / Vulnerable / Unaffected
35 -------------------------------------------------------------------
36 1 dev-lang/python < 2.2.2 >= 2.2.2
37 < 2.2
38
39 Description
40 ===========
41
42 If IPV6 is disabled in Python 2.2, getaddrinfo() is not able to handle
43 IPV6 DNS requests properly and a buffer overflow occurs.
44
45 Impact
46 ======
47
48 An attacker can execute arbitrary code as the user running python.
49
50 Workaround
51 ==========
52
53 Users with IPV6 enabled are not affected by this vulnerability.
54
55 Resolution
56 ==========
57
58 All Python 2.2 users should upgrade to the latest version:
59
60 # emerge sync
61
62 # emerge -pv ">=dev-lang/python-2.2.2"
63 # emerge ">=dev-lang/python-2.2.2"
64
65 References
66 ==========
67
68 [ 1 ] CVE-2004-0150
69 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0150
70 [ 2 ] OSVDB:4172
71 http://www.osvdb.org/4172
72
73 Availability
74 ============
75
76 This GLSA and any updates to it are available for viewing at
77 the Gentoo Security Website:
78
79 http://security.gentoo.org/glsa/glsa-200409-03.xml
80
81 Concerns?
82 =========
83
84 Security is a primary focus of Gentoo Linux and ensuring the
85 confidentiality and security of our users machines is of utmost
86 importance to us. Any security concerns should be addressed to
87 security@g.o or alternatively, you may file a bug at
88 http://bugs.gentoo.org.
89
90 License
91 =======
92
93 Copyright 2004 Gentoo Foundation, Inc; referenced text
94 belongs to its owner(s).
95
96 The contents of this document are licensed under the
97 Creative Commons - Attribution / Share Alike license.
98
99 http://creativecommons.org/licenses/by-sa/1.0
100
101 -----BEGIN PGP SIGNATURE-----
102 Version: GnuPG v1.2.4 (GNU/Linux)
103 Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org
104
105 iD8DBQFBN4CSvcL1obalX08RAprZAJ49/Kwlu+mF5NXrNAXWZ7ypSHfFLQCfQUGV
106 jnqJRnUP5OwSLEYNBHoD8Dc=
107 =Q4sn
108 -----END PGP SIGNATURE-----