Vulnerability Name: CVE-2008-4864 (CCN-46606) Assigned: 2008-10-19 Published: 2008-10-19 Updated: 2022-07-05 Summary: Multiple integer overflows in imageop.c in the imageop module in Python 1.5.2 through 2.5.1 allow context-dependent attackers to break out of the Python VM and execute arbitrary code via large integer values in certain arguments to the crop function, leading to a buffer overflow, a different vulnerability than CVE-2007-4965 and CVE-2008-1679 . CVSS v3 Severity: 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): LowIntegrity (I): LowAvailibility (A): Low
CVSS v2 Severity: 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P )5.5 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P )5.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
Vulnerability Type: CWE-190 Vulnerability Consequences: Gain Access References: Source: MITRE Type: CNACVE-2008-4864 Source: APPLE Type: Mailing List, Third Party AdvisoryAPPLE-SA-2009-02-12 Source: CCN Type: Python Web sitePython Programming Language Source: CCN Type: RHSA-2009-1176Moderate: python security update Source: CCN Type: RHSA-2009-1177Moderate: python security update Source: CCN Type: RHSA-2009-1178Moderate: python security update Source: CCN Type: CESA-2008-008 - rev 1Python VM breakout bugs Source: MISC Type: Exploit, Third Party Advisoryhttp://scary.beasts.org/security/CESA-2008-008.html Source: CCN Type: SA33937Apple Mac OS X Security Update Fixes Multiple Vulnerabilities Source: SECUNIA Type: Not Applicable33937 Source: SECUNIA Type: Not Applicable37471 Source: CCN Type: Apple Web siteAbout the security content of Security Update 2009-001 Source: CONFIRM Type: Third Party Advisoryhttp://support.apple.com/kb/HT3438 Source: CCN Type: ASA-2009-305python security update (RHSA-2009-1176) Source: CONFIRM Type: Permissions Requiredhttp://svn.python.org/view/python/trunk/Modules/imageop.c?rev=66689&view=diff&r1=66689&r2=66688&p1=python/trunk/Modules/imageop.c&p2=/python/trunk/Modules/imageop.c Source: CCN Type: Python SVN Repositoryprojects Source: CONFIRM Type: Permissions Requiredhttp://svn.python.org/view?rev=66689&view=rev Source: CCN Type: oss-security Mailing List, Mon, 27 Oct 2008 17:22:44 +0100CVE request -- Python imageop#3 Source: MLIST Type: Mailing List, Third Party Advisory[oss-security] 20081027 CVE request -- Python imageop#3 Source: CCN Type: oss-security Mailing List, Wed, 29 Oct 2008 11:28:33 +0100 CVE Request - Python imageop Source: MLIST Type: Mailing List, Third Party Advisory[oss-security] 20081029 CVE Request - Python imageop Source: CCN Type: OSVDB ID: 50097Python imageop Module imageop.c crop Function Multiple Overflows Source: BUGTRAQ Type: Third Party Advisory, VDB Entry20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components Source: BID Type: Third Party Advisory, VDB Entry31932 Source: CCN Type: BID-31932Python 'Imageop' Module Argument Validation Buffer Overflow Vulnerability Source: BID Type: Exploit, Third Party Advisory, VDB Entry31976 Source: CCN Type: BID-31976RETIRED: Python Imageop Module 'imageop.crop()' Buffer Overflow Vulnerability Source: CCN Type: USN-806-1Python vulnerabilities Source: CONFIRM Type: Third Party Advisoryhttp://www.vmware.com/security/advisories/VMSA-2009-0016.html Source: VUPEN Type: Permissions RequiredADV-2009-3316 Source: XF Type: Third Party Advisory, VDB Entrypython-image-module-bo(46606) Source: XF Type: UNKNOWNpython-image-module-bo(46606) Source: OVAL Type: Third Party Advisoryoval:org.mitre.oval:def:10702 Source: OVAL Type: Broken Linkoval:org.mitre.oval:def:8354 Source: SUSE Type: SUSE-SR:2009:001SUSE Security Summary Report Vulnerable Configuration: Configuration 1 :cpe:/a:python:python:*:*:*:*:*:*:*:* (Version >= 2.5.0 and < 2.5.3)OR cpe:/a:python:python:*:*:*:*:*:*:*:* (Version >= 1.5.2 and < 2.4.6) Configuration RedHat 1 :cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:* Configuration RedHat 2 :cpe:/o:redhat:enterprise_linux:5::client:*:*:*:*:* Configuration RedHat 3 :cpe:/o:redhat:enterprise_linux:5::client_workstation:*:*:*:*:* Configuration RedHat 4 :cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:* Configuration RedHat 5 :cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:* Configuration RedHat 6 :cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:* Configuration RedHat 7 :cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:* Configuration RedHat 8 :cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:* Configuration RedHat 9 :cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:* Configuration CCN 1 :cpe:/a:python:python:1.5.2:*:*:*:*:*:*:* OR cpe:/a:python:python:2.2:*:*:*:*:*:*:* OR cpe:/a:python:python:2.2.1:*:*:*:*:*:*:* OR cpe:/a:python:python:2.4.0:*:*:*:*:*:*:* OR cpe:/a:python:python:2.5.0:*:*:*:*:*:*:* OR cpe:/a:python:python:1.6:*:*:*:*:*:*:* OR cpe:/a:python:python:1.6.1:*:*:*:*:*:*:* OR cpe:/a:python:python:2.0:*:*:*:*:*:*:* OR cpe:/a:python:python:2.0.1:*:*:*:*:*:*:* OR cpe:/a:python:python:2.1:*:*:*:*:*:*:* OR cpe:/a:python:python:2.1.1:*:*:*:*:*:*:* OR cpe:/a:python:python:2.1.2:*:*:*:*:*:*:* OR cpe:/a:python:python:2.1.3:*:*:*:*:*:*:* OR cpe:/a:python:python:2.2.2:*:*:*:*:*:*:* OR cpe:/a:python:python:2.2.3:*:*:*:*:*:*:* OR cpe:/a:python:python:2.3.0:*:*:*:*:*:*:* OR cpe:/a:python:python:2.3.1:*:*:*:*:*:*:* OR cpe:/a:python:python:2.3.2:*:*:*:*:*:*:* OR cpe:/a:python:python:2.3.3:*:*:*:*:*:*:* OR cpe:/a:python:python:2.3.4:*:*:*:*:*:*:* OR cpe:/a:python:python:2.3.5:*:*:*:*:*:*:* OR cpe:/a:python:python:2.3.6:*:*:*:*:*:*:* OR cpe:/a:python:python:2.4.1:*:*:*:*:*:*:* OR cpe:/a:python:python:2.4.2:*:*:*:*:*:*:* OR cpe:/a:python:python:2.4.3:*:*:*:*:*:*:* OR cpe:/a:python:python:2.4.4:*:*:*:*:*:*:* OR cpe:/a:python:python:2.5.1:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x:10.5.6:*:*:*:*:*:*:* AND cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:* OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:* OR cpe:/o:canonical:ubuntu:6.06::lts:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0::x86_64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0::x86_64:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2008.0::x86-64:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:5:*:client:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2008.1:x86_64:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2008.1:*:*:*:*:*:*:* OR cpe:/o:canonical:ubuntu:8.04::lts:*:*:*:*:* OR cpe:/o:mandriva:linux:2009.0:*:*:*:*:*:*:* OR cpe:/o:mandriva:linux:2009.0:-:x86_64:*:*:*:*:* OR cpe:/o:apple:mac_os_x_server:10.5.6:*:*:*:*:*:*:* Denotes that component is vulnerable Oval Definitions BACK
python python *
python python *
python python 1.5.2
python python 2.2
python python 2.2.1
python python 2.4
python python 2.5
python python 1.6
python python 1.6.1
python python 2.0
python python 2.0.1
python python 2.1
python python 2.1.1
python python 2.1.2
python python 2.1.3
python python 2.2.2
python python 2.2.3
python python 2.3
python python 2.3.1
python python 2.3.2
python python 2.3.3
python python 2.3.4
python python 2.3.5
python python 2.3.6
python python 2.4.1
python python 2.4.2
python python 2.4.3
python python 2.4.4
python python 2.5.1
apple mac os x 10.5.6
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
mandrakesoft mandrake linux corporate server 3.0
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
mandrakesoft mandrake multi network firewall 2.0
canonical ubuntu 6.06
mandrakesoft mandrake linux corporate server 4.0
mandrakesoft mandrake linux corporate server 4.0
mandrakesoft mandrake linux corporate server 3.0
redhat enterprise linux 5
redhat enterprise linux 5
mandrakesoft mandrake linux 2008.0
redhat enterprise linux 5
mandrakesoft mandrake linux 2008.0
mandrakesoft mandrake linux 2008.1 x86_64
apple mac os x 10.4.11
apple mac os x server 10.4.11
mandrakesoft mandrake linux 2008.1
canonical ubuntu 8.04
mandriva linux 2009.0
mandriva linux 2009.0 -
apple mac os x server 10.5.6