CVE-2006-1542
Gravedad CVSS v2.0:
BAJA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
30/03/2006
Última modificación:
03/04/2025
Descripción
*** Pendiente de traducción *** Stack-based buffer overflow in Python 2.4.2 and earlier, running on Linux 2.6.12.5 under gcc 4.0.3 with libc 2.3.5, allows local users to cause a "stack overflow," and possibly gain privileges, by running a script from a current working directory that has a long name, related to the realpath function. NOTE: this might not be a vulnerability. However, the fact that it appears in a programming language interpreter could mean that some applications are affected, although attack scenarios might be limited because the attacker might already need to cross privilege boundaries to cause an exploitable program to be placed in a directory with a long name; or, depending on the method that Python uses to determine the current working directory, setuid applications might be affected.
Impacto
Puntuación base 2.0
3.70
Gravedad 2.0
BAJA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:a:python:python:*:*:*:*:*:*:*:* | 2.4.2 (incluyendo) |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://secunia.com/advisories/31492
- http://www.gotfault.net/research/exploit/gexp-python.py
- http://www.redhat.com/support/errata/RHSA-2008-0629.html
- https://www.exploit-db.com/exploits/1591
- http://secunia.com/advisories/31492
- http://www.gotfault.net/research/exploit/gexp-python.py
- http://www.redhat.com/support/errata/RHSA-2008-0629.html
- https://www.exploit-db.com/exploits/1591



