Description
Multiple buffer overflows in Python 2.5.2 and earlier on 32bit platforms allow context-dependent attackers to cause a denial of service (crash) or have unspecified other impact via a long string that leads to incorrect memory allocation during Unicode string processing, related to the unicode_resize function and the PyMem_RESIZE macro.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1667-1 | New python2.4 packages fix several vulnerabilities |
EUVD |
EUVD-2008-3132 | Multiple buffer overflows in Python 2.5.2 and earlier on 32bit platforms allow context-dependent attackers to cause a denial of service (crash) or have unspecified other impact via a long string that leads to incorrect memory allocation during Unicode string processing, related to the unicode_resize function and the PyMem_RESIZE macro. |
Ubuntu USN |
USN-632-1 | Python vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T09:28:41.489Z
Reserved: 2008-07-10T00:00:00.000Z
Link: CVE-2008-3142
No data.
Status : Modified
Published: 2008-08-01T14:41:00.000
Modified: 2026-04-23T00:35:47.467
Link: CVE-2008-3142
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN