News Stay informed about the latest enterprise technology news and product updates.

Python vulnerability permits remote attacks

Thousands of applications, including large and mission critical systems, are vulnerable to a bug that could allow a remote attacker to execute arbitrary code or gain system access.

Thousands of applications, including many large and mission critical systems at enterprises like Industrial Light...

& Magic, Google and NASA, are vulnerable to a bug that could allow a remote attacker to execute arbitrary code or gain system access.

Applications and systems using Python -- including Debian GNU/Linux and Mandrake Linux -- may need to be updated or rebuilt.

For more information

Click here for Secunia's advisory on the vulnerability. To upgrade Python, see here.

See below for product specific information:


Mandrake Corporate Server 2.x or Mandrake Linux 9.x

Python is an interactive, object-oriented programming language commonly used for scripting. It runs on Unix, Windows, OS/2, Mac, Amiga and other platforms.

Python developer Sebastian Schmidt has discovered vulnerability in the getaddrinfo function, which resolves a host and port into the addrinfo struct.

A remote attacker could supply a specially crafted IPv6 address via DNS that could cause a buffer overflow, permitting execution of arbitrary code and unauthorized system access. This only occurs if Python is configured without IPv6 support.

Only a week ago, another Python vulnerability was discovered involving Debian and Apache that allowed a remote denial of service.

Dig Deeper on Application attacks (buffer overflows, cross-site scripting)



Find more PRO+ content and other member only offers, here.

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.