Multiple buffer overflows in the RLE decoder in the rgbimg module in Python 2.5 allow remote attackers to have an unspecified impact via an image file containing crafted data that triggers improper processing within the (1) longimagedata or (2) expandrow function.
References
Configurations
History
21 Nov 2024, 01:14
Type | Values Removed | Values Added |
---|---|---|
References | () http://bugs.python.org/issue8678 - Patch, Vendor Advisory | |
References | () http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html - Third Party Advisory | |
References | () http://secunia.com/advisories/42888 - Broken Link | |
References | () http://secunia.com/advisories/43068 - Broken Link | |
References | () http://secunia.com/advisories/43364 - Broken Link | |
References | () http://support.apple.com/kb/HT4435 - Third Party Advisory | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2010:215 - Broken Link | |
References | () http://www.redhat.com/support/errata/RHSA-2011-0027.html - Third Party Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2011-0260.html - Third Party Advisory | |
References | () http://www.securityfocus.com/bid/40365 - Third Party Advisory, VDB Entry | |
References | () http://www.vupen.com/english/advisories/2011/0122 - Third Party Advisory | |
References | () http://www.vupen.com/english/advisories/2011/0212 - Third Party Advisory | |
References | () http://www.vupen.com/english/advisories/2011/0413 - Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=541698 - Issue Tracking, Patch |
Information
Published : 2010-05-27 19:30
Updated : 2024-11-21 01:14
NVD link : CVE-2010-1450
Mitre link : CVE-2010-1450
CVE.ORG link : CVE-2010-1450
JSON object : View
Products Affected
python
- python
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')