CVE-2005-0089

The SimpleXMLRPCServer library module in Python 2.2, 2.3 before 2.3.5, and 2.4, when used by XML-RPC servers that use the register_instance method to register an object without a _dispatch method, allows remote attackers to read or modify globals of the associated module, and possibly execute arbitrary code, via dotted attributes.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.4.0:*:*:*:*:*:*:*

History

02 Aug 2023, 18:04

Type Values Removed Values Added
CPE cpe:2.3:a:python_software_foundation:python:2.4:*:*:*:*:*:*:*
cpe:2.3:a:python_software_foundation:python:2.3.1:*:*:*:*:*:*:*
cpe:2.3:a:python_software_foundation:python:2.2:*:*:*:*:*:*:*
cpe:2.3:a:python_software_foundation:python:2.3.3:*:*:*:*:*:*:*
cpe:2.3:a:python_software_foundation:python:2.3.2:*:*:*:*:*:*:*
cpe:2.3:a:python_software_foundation:python:2.3:*:*:*:*:*:*:*
cpe:2.3:a:python_software_foundation:python:2.3.4:*:*:*:*:*:*:*
cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.4.0:*:*:*:*:*:*:*
References (TRUSTIX) http://www.trustix.org/errata/2005/0003/ - (TRUSTIX) http://www.trustix.org/errata/2005/0003/ - Third Party Advisory
References (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/19217 - (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/19217 - VDB Entry
References (SECTRACK) http://securitytracker.com/id?1013083 - (SECTRACK) http://securitytracker.com/id?1013083 - Broken Link, Third Party Advisory, VDB Entry
References (DEBIAN) http://www.debian.org/security/2005/dsa-666 - Patch (DEBIAN) http://www.debian.org/security/2005/dsa-666 - Patch, Third Party Advisory
References (MANDRAKE) http://www.mandriva.com/security/advisories?name=MDKSA-2005:035 - (MANDRAKE) http://www.mandriva.com/security/advisories?name=MDKSA-2005:035 - Broken Link, Third Party Advisory
References (BID) http://www.securityfocus.com/bid/12437 - (BID) http://www.securityfocus.com/bid/12437 - Third Party Advisory, VDB Entry
References (SECUNIA) http://secunia.com/advisories/14128 - (SECUNIA) http://secunia.com/advisories/14128 - Broken Link
References (BUGTRAQ) http://marc.info/?l=bugtraq&m=110746469728728&w=2 - (BUGTRAQ) http://marc.info/?l=bugtraq&m=110746469728728&w=2 - Mailing List, Third Party Advisory
References (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9811 - (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9811 - Broken Link
References (CONFIRM) http://www.python.org/security/PSF-2005-001/ - Patch (CONFIRM) http://www.python.org/security/PSF-2005-001/ - Broken Link, Patch, Vendor Advisory
References (REDHAT) http://www.redhat.com/support/errata/RHSA-2005-108.html - (REDHAT) http://www.redhat.com/support/errata/RHSA-2005-108.html - Third Party Advisory
References (CONFIRM) http://python.org/security/PSF-2005-001/patch-2.2.txt - Patch (CONFIRM) http://python.org/security/PSF-2005-001/patch-2.2.txt - Broken Link, Patch
First Time Python
Python python

Information

Published : 2005-05-02 04:00

Updated : 2023-12-10 10:28


NVD link : CVE-2005-0089

Mitre link : CVE-2005-0089

CVE.ORG link : CVE-2005-0089


JSON object : View

Products Affected

python

  • python