FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The last vuln.xml file processed by FreshPorts is:

Revision:  365592
Date:      2014-08-21
Time:      19:46:21Z
Committer: zi

List all Vulnerabilities, by package

List all Vulnerabilities, by date

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
6afa87d3-764b-11d9-b0e7-0000e249a0a2python -- SimpleXMLRPCServer.py allows unrestricted traversal

According to Python Security Advisory PSF-2005-001,

The Python development team has discovered a flaw in the SimpleXMLRPCServer library module which can give remote attackers access to internals of the registered object or its module or possibly other modules. The flaw only affects Python XML-RPC servers that use the register_instance() method to register an object without a _dispatch() method. Servers using only register_function() are not affected.

On vulnerable XML-RPC servers, a remote attacker may be able to view or modify globals of the module(s) containing the registered instance's class(es), potentially leading to data loss or arbitrary code execution. If the registered object is a module, the danger is particularly serious. For example, if the registered module imports the os module, an attacker could invoke the os.system() function.

Note: This vulnerability affects your system only if you're running SimpleXMLRPCServer-based server. This isn't harmful at all if you don't run any internet server written in Python or your server doesn't serve in XML-RPC protocol.


Discovery 2005-02-03
Entry 2005-02-03
Modified 2006-10-08
python
python+ipv6
ge 2.2 lt 2.2.3_7

ge 2.3 lt 2.3.4_4

ge 2.4 lt 2.4_1

ge 2.5.a0.20050129 lt 2.5.a0.20050129_1

CVE-2005-0089
http://www.python.org/security/PSF-2005-001/
6afa87d3-764b-11d9-b0e7-0000e249a0a2python -- SimpleXMLRPCServer.py allows unrestricted traversal

According to Python Security Advisory PSF-2005-001,

The Python development team has discovered a flaw in the SimpleXMLRPCServer library module which can give remote attackers access to internals of the registered object or its module or possibly other modules. The flaw only affects Python XML-RPC servers that use the register_instance() method to register an object without a _dispatch() method. Servers using only register_function() are not affected.

On vulnerable XML-RPC servers, a remote attacker may be able to view or modify globals of the module(s) containing the registered instance's class(es), potentially leading to data loss or arbitrary code execution. If the registered object is a module, the danger is particularly serious. For example, if the registered module imports the os module, an attacker could invoke the os.system() function.

Note: This vulnerability affects your system only if you're running SimpleXMLRPCServer-based server. This isn't harmful at all if you don't run any internet server written in Python or your server doesn't serve in XML-RPC protocol.


Discovery 2005-02-03
Entry 2005-02-03
Modified 2006-10-08
python
python+ipv6
ge 2.2 lt 2.2.3_7

ge 2.3 lt 2.3.4_4

ge 2.4 lt 2.4_1

ge 2.5.a0.20050129 lt 2.5.a0.20050129_1

CVE-2005-0089
http://www.python.org/security/PSF-2005-001/
fe83eb5b-55e1-11db-a5ae-00508d6a62dfpython -- buffer overrun in repr() for unicode strings

Benjamin C. Wiley Sittler reports:

I discovered a [buffer overrun in repr() for unicode strings]. This causes an unpatched non-debug wide (UTF-32/UCS-4) build of python to abort.

Ubuntu security team reports:

If an application uses repr() on arbitrary untrusted data, this [bug] could be exploited to execute arbitrary code with the privileges of the python application.


Discovery 2006-08-15
Entry 2006-10-07
Modified 2006-10-08
python+ipv6
ge 0

python
lt 2.4.3_1

gt 2.5.* lt 2.5.c2

CVE-2006-4980
https://launchpad.net/distros/ubuntu/+source/python2.4/+bug/56633
http://www.ubuntu.com/usn/usn-359-1
http://secunia.com/advisories/22276/
fe83eb5b-55e1-11db-a5ae-00508d6a62dfpython -- buffer overrun in repr() for unicode strings

Benjamin C. Wiley Sittler reports:

I discovered a [buffer overrun in repr() for unicode strings]. This causes an unpatched non-debug wide (UTF-32/UCS-4) build of python to abort.

Ubuntu security team reports:

If an application uses repr() on arbitrary untrusted data, this [bug] could be exploited to execute arbitrary code with the privileges of the python application.


Discovery 2006-08-15
Entry 2006-10-07
Modified 2006-10-08
python+ipv6
ge 0

python
lt 2.4.3_1

gt 2.5.* lt 2.5.c2

CVE-2006-4980
https://launchpad.net/distros/ubuntu/+source/python2.4/+bug/56633
http://www.ubuntu.com/usn/usn-359-1
http://secunia.com/advisories/22276/