Vulnerability Details : CVE-2008-1887
Python 2.5.2 and earlier allows context-dependent attackers to execute arbitrary code via multiple vectors that cause a negative size value to be provided to the PyString_FromStringAndSize function, which allocates less memory than expected when assert() is disabled and triggers a buffer overflow.
Vulnerability category: OverflowExecute code
Threat overview for CVE-2008-1887
Top countries where our scanners detected CVE-2008-1887
Top open port discovered on systems with this issue
80
IPs affected by CVE-2008-1887 275
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2008-1887!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2008-1887
Probability of exploitation activity in the next 30 days: 0.47%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 73 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2008-1887
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
CWE ids for CVE-2008-1887
-
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.Assigned by: nvd@nist.gov (Primary)
References for CVE-2008-1887
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10407
Third Party Advisory
-
http://www.debian.org/security/2008/dsa-1551
Patch;Third Party Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/41944
Third Party Advisory;VDB Entry
-
http://www.vmware.com/security/advisories/VMSA-2009-0016.html
VMSA-2009-0016.6Third Party Advisory
-
http://www.vupen.com/english/advisories/2009/3316
Webmail: access your OVH emails on ovhcloud.com | OVHcloudPermissions Required
-
http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0122
Broken Link
-
http://www.ubuntu.com/usn/usn-632-1
Third Party Advisory
-
http://security.gentoo.org/glsa/glsa-200807-01.xml
Third Party Advisory
-
http://www.debian.org/security/2008/dsa-1620
Patch;Third Party Advisory
-
http://support.apple.com/kb/HT3438
About the security content of Security Update 2009-001 - Apple SupportThird Party Advisory
-
http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
Mailing List;Third Party Advisory
-
http://www.novell.com/support/search.do?cmd=displayKC&docType=kc&externalId=InfoDocument-patchbuilder-readme5032900
Third Party Advisory
-
http://www.securityfocus.com/archive/1/490776
Exploit;Third Party Advisory;VDB Entry
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8624
Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html
Mailing List;Third Party Advisory
-
http://www.securityfocus.com/archive/1/507985/100/0/threaded
Third Party Advisory;VDB Entry
-
http://www.securityfocus.com/archive/1/506056/100/0/threaded
Third Party Advisory;VDB Entry
-
http://bugs.python.org/issue2587
Exploit;Issue Tracking;Vendor Advisory
-
http://www.securityfocus.com/bid/28749
Patch;Third Party Advisory;VDB Entry
Products affected by CVE-2008-1887
- cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
- cpe:2.3:a:python:python:*:*:*:*:*:*:*:*