Revision Date: | 2013-04-29 | Version: | 11 | Title: | Sendmail before 8.13.7 allows remote attackers to cause a denial of service via deeply nested, malformed multipart MIME messages that exhaust the stack during the recursive mime8to7 function for performing 8-bit to 7-bit conversion, which prevents Sendmail from delivering queued messages and might lead to disk consumption by core dump files. | Description: | The SimpleXMLRPCServer library module in Python 2.2, 2.3 before 2.3.5, and 2.4, when used by XML-RPC servers that use the register_instance method to register an object without a _dispatch method, allows remote attackers to read or modify globals of the associated module, and possibly execute arbitrary code, via dotted attributes. | Family: | unix | Class: | vulnerability | Status: | ACCEPTED | Reference(s): | CVE-2005-0089
| Platform(s): | CentOS Linux 3 CentOS Linux 4 Oracle Linux 4 Red Hat Enterprise Linux 3 Red Hat Enterprise Linux 4
| Product(s): | | Definition Synopsis | OS Section: RHEL3, CentOS3 RHEL3 or CentOS3
The operating system installed on the system is Red Hat Enterprise Linux 3
OR CentOS Linux 3.x
AND Configuration section
python-devel is earlier than 0:2.2.3-6.1
OR tkinter is earlier than 0:2.2.3-6.1
OR python-tools is earlier than 0:2.2.3-6.1
OR python is earlier than 0:2.2.3-6.1
OR OS Section: RHEL4, CentOS4, Oracle Linux 4
RHEL4, CentOS4 or Oracle Linux 4
The operating system installed on the system is Red Hat Enterprise Linux 4
OR CentOS Linux 4.x
OR Oracle Linux 4.x
AND Configuration section
python-devel is earlier than 0:2.3.4-14.1
OR tkinter is earlier than 0:2.3.4-14.1
OR python-tools is earlier than 0:2.3.4-14.1
OR python is earlier than 0:2.3.4-14.1
OR python-docs is earlier than 0:2.3.4-14.1
|
|