Integer Overflow or Wraparound Affecting python package, versions <0:2.4.3-24.el5_3.6


Severity

Recommended
medium

Based on Oracle Linux security rating.

Threat Intelligence

EPSS
2.24% (90th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-ORACLE5-PYTHON-2450893
  • published10 Apr 2022
  • disclosed1 Aug 2008

Introduced: 1 Aug 2008

CVE-2008-3143  (opens in a new tab)
CWE-190  (opens in a new tab)

How to fix?

Upgrade Oracle:5 python to version 0:2.4.3-24.el5_3.6 or higher.
This issue was patched in ELSA-2009-1176.

NVD Description

Note: Versions mentioned in the description apply only to the upstream python package and not the python package as distributed by Oracle. See How to fix? for Oracle:5 relevant fixed versions and status.

Multiple integer overflows in Python before 2.5.2 might allow context-dependent attackers to have an unknown impact via vectors related to (1) Include/pymem.h; (2) _csv.c, (3) _struct.c, (4) arraymodule.c, (5) audioop.c, (6) binascii.c, (7) cPickle.c, (8) cStringIO.c, (9) cjkcodecs/multibytecodec.c, (10) datetimemodule.c, (11) md5.c, (12) rgbimgmodule.c, and (13) stropmodule.c in Modules/; (14) bufferobject.c, (15) listobject.c, and (16) obmalloc.c in Objects/; (17) Parser/node.c; and (18) asdl.c, (19) ast.c, (20) bltinmodule.c, and (21) compile.c in Python/, as addressed by "checks for integer overflows, contributed by Google."

References

CVSS Scores

version 3.1