CVE-2010-1450

Multiple buffer overflows in the RLE decoder in the rgbimg module in Python 2.5 allow remote attackers to have an unspecified impact via an image file containing crafted data that triggers improper processing within the (1) longimagedata or (2) expandrow function.
References
Link Resource
http://bugs.python.org/issue8678 Patch Vendor Advisory
http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html Third Party Advisory
http://secunia.com/advisories/42888 Broken Link
http://secunia.com/advisories/43068 Broken Link
http://secunia.com/advisories/43364 Broken Link
http://support.apple.com/kb/HT4435 Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2010:215 Broken Link
http://www.redhat.com/support/errata/RHSA-2011-0027.html Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2011-0260.html Third Party Advisory
http://www.securityfocus.com/bid/40365 Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2011/0122 Third Party Advisory
http://www.vupen.com/english/advisories/2011/0212 Third Party Advisory
http://www.vupen.com/english/advisories/2011/0413 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=541698 Issue Tracking Patch
http://bugs.python.org/issue8678 Patch Vendor Advisory
http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html Third Party Advisory
http://secunia.com/advisories/42888 Broken Link
http://secunia.com/advisories/43068 Broken Link
http://secunia.com/advisories/43364 Broken Link
http://support.apple.com/kb/HT4435 Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2010:215 Broken Link
http://www.redhat.com/support/errata/RHSA-2011-0027.html Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2011-0260.html Third Party Advisory
http://www.securityfocus.com/bid/40365 Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2011/0122 Third Party Advisory
http://www.vupen.com/english/advisories/2011/0212 Third Party Advisory
http://www.vupen.com/english/advisories/2011/0413 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=541698 Issue Tracking Patch
Configurations

Configuration 1 (hide)

cpe:2.3:a:python:python:2.5.0:*:*:*:*:*:*:*

History

21 Nov 2024, 01:14

Type Values Removed Values Added
References () http://bugs.python.org/issue8678 - Patch, Vendor Advisory () http://bugs.python.org/issue8678 - Patch, Vendor Advisory
References () http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html - Mailing List, Third Party Advisory () http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html - Mailing List, Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html - Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html - Third Party Advisory
References () http://secunia.com/advisories/42888 - Broken Link () http://secunia.com/advisories/42888 - Broken Link
References () http://secunia.com/advisories/43068 - Broken Link () http://secunia.com/advisories/43068 - Broken Link
References () http://secunia.com/advisories/43364 - Broken Link () http://secunia.com/advisories/43364 - Broken Link
References () http://support.apple.com/kb/HT4435 - Third Party Advisory () http://support.apple.com/kb/HT4435 - Third Party Advisory
References () http://www.mandriva.com/security/advisories?name=MDVSA-2010:215 - Broken Link () http://www.mandriva.com/security/advisories?name=MDVSA-2010:215 - Broken Link
References () http://www.redhat.com/support/errata/RHSA-2011-0027.html - Third Party Advisory () http://www.redhat.com/support/errata/RHSA-2011-0027.html - Third Party Advisory
References () http://www.redhat.com/support/errata/RHSA-2011-0260.html - Third Party Advisory () http://www.redhat.com/support/errata/RHSA-2011-0260.html - Third Party Advisory
References () http://www.securityfocus.com/bid/40365 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/40365 - Third Party Advisory, VDB Entry
References () http://www.vupen.com/english/advisories/2011/0122 - Third Party Advisory () http://www.vupen.com/english/advisories/2011/0122 - Third Party Advisory
References () http://www.vupen.com/english/advisories/2011/0212 - Third Party Advisory () http://www.vupen.com/english/advisories/2011/0212 - Third Party Advisory
References () http://www.vupen.com/english/advisories/2011/0413 - Third Party Advisory () http://www.vupen.com/english/advisories/2011/0413 - Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=541698 - Issue Tracking, Patch () https://bugzilla.redhat.com/show_bug.cgi?id=541698 - Issue Tracking, Patch

Information

Published : 2010-05-27 19:30

Updated : 2024-11-21 01:14


NVD link : CVE-2010-1450

Mitre link : CVE-2010-1450

CVE.ORG link : CVE-2010-1450


JSON object : View

Products Affected

python

  • python
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')