The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

computer vulnerability bulletin CVE-2014-1912

Python: buffer overflow of sock_recvfrom_into

Synthesis of the vulnerability

An attacker can generate a buffer overflow in the sock_recvfrom_into() function of Python, in order to trigger a denial of service, and possibly to execute code.
Impacted products: Debian, Fedora, MBS, MES, openSUSE, Solaris, Python, RHEL, Ubuntu.
Severity: 2/4.
Creation date: 14/02/2014.
Identifiers: 20246, CERTFR-2014-AVI-244, CVE-2014-1912, DSA-2880-1, FEDORA-2014-2394, FEDORA-2014-2418, MDVSA-2014:041, MDVSA-2015:075, MDVSA-2015:076, openSUSE-SU-2014:0380-1, openSUSE-SU-2014:0498-1, openSUSE-SU-2014:0518-1, openSUSE-SU-2014:0597-1, openSUSE-SU-2014:1734-1, RHSA-2015:1064-01, USN-2125-1, VIGILANCE-VUL-14258.

Description of the vulnerability

The Python socket module provides the socket.recvfrom_into() function, which receives data from a network socket, and then stores them in an array.

However, if the size of network data is greater than the size of the storage array, an overflow occurs in the sock_recvfrom_into() function.

An attacker can therefore generate a buffer overflow in the sock_recvfrom_into() function of Python, in order to trigger a denial of service, and possibly to execute code.
Complete Vigil@nce bulletin.... (free trial)

Computer vulnerabilities tracking service

Vigil@nce provides a computer vulnerability management. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications. The technology watch team tracks security threats targeting the computer system. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system.