vulnerability bulletin CVE-2014-1912
Python: buffer overflow of sock_recvfrom_into
Synthesis of the vulnerability
An attacker can generate a buffer overflow in the sock_recvfrom_into() function of Python, in order to trigger a denial of service, and possibly to execute code.Impacted products: Debian
, Unix (platform)
20246, CERTFR-2014-AVI-244, CVE-2014-1912, DSA-2880-1, FEDORA-2014-2394, FEDORA-2014-2418, MDVSA-2014:041, openSUSE-SU-2014:0380-1, openSUSE-SU-2014:0498-1, openSUSE-SU-2014:0518-1, openSUSE-SU-2014:0597-1, USN-2125-1, VIGILANCE-VUL-14258.
Description of the vulnerability
The Python socket module provides the socket.recvfrom_into() function, which receives data from a network socket, and then stores them in an array.
However, if the size of network data is greater than the size of the storage array, an overflow occurs in the sock_recvfrom_into() function.
An attacker can therefore generate a buffer overflow in the sock_recvfrom_into() function of Python, in order to trigger a denial of service, and possibly to execute code.Complete Vigil@nce bulletin....
Share this bulletin
Computer vulnerabilities tracking service
Vigil@nce provides a computer vulnerability management
. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications. The technology watch team tracks security threats targeting the computer system. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system.