Executive Summary

Informations
Name CVE-2006-1542 First vendor Publication 2006-03-30
Vendor Cve Last vendor Modification 2024-11-21

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:H/Au:N/C:P/I:P/A:P)
Cvss Base Score 3.7 Attack Range Local
Cvss Impact Score 6.4 Attack Complexity High
Cvss Expoit Score 1.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Stack-based buffer overflow in Python 2.4.2 and earlier, running on Linux 2.6.12.5 under gcc 4.0.3 with libc 2.3.5, allows local users to cause a "stack overflow," and possibly gain privileges, by running a script from a current working directory that has a long name, related to the realpath function. NOTE: this might not be a vulnerability. However, the fact that it appears in a programming language interpreter could mean that some applications are affected, although attack scenarios might be limited because the attacker might already need to cross privilege boundaries to cause an exploitable program to be placed in a directory with a long name; or, depending on the method that Python uses to determine the current working directory, setuid applications might be affected.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1542

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 31

Open Source Vulnerability Database (OSVDB)

Id Description
24042 Python Interpreter realpath() Function Overflow

Nessus® Vulnerability Scanner

Date Description
2010-01-10 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2008-0264.nasl - Type : ACT_GATHER_INFO
2010-01-10 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2008-0525.nasl - Type : ACT_GATHER_INFO
2010-01-10 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2008-0629.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

http://secunia.com/advisories/31492
http://www.gotfault.net/research/exploit/gexp-python.py
http://www.redhat.com/support/errata/RHSA-2008-0629.html
https://www.exploit-db.com/exploits/1591
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
Date Informations
2024-11-28 23:20:49
  • Multiple Updates
2024-11-28 12:08:37
  • Multiple Updates
2023-08-02 21:27:55
  • Multiple Updates
2021-05-05 01:02:19
  • Multiple Updates
2021-05-04 12:03:52
  • Multiple Updates
2021-04-22 01:04:25
  • Multiple Updates
2020-05-23 01:37:27
  • Multiple Updates
2020-05-23 00:17:36
  • Multiple Updates
2017-10-19 09:23:47
  • Multiple Updates
2016-04-26 14:27:39
  • Multiple Updates
2014-02-17 10:35:18
  • Multiple Updates
2013-05-11 10:52:57
  • Multiple Updates