CVE-2012-2135

The utf-16 decoder in Python 3.1 through 3.3 does not update the aligned_end variable after calling the unicode_decode_call_errorhandler function, which allows remote attackers to obtain sensitive information (process memory) or cause a denial of service (memory corruption and crash) via unspecified vectors.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
cpe:2.3:a:python:python:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*

History

28 Jul 2022, 12:36

Type Values Removed Values Added
References (SECUNIA) http://secunia.com/advisories/51087 - (SECUNIA) http://secunia.com/advisories/51087 - Third Party Advisory
References (UBUNTU) http://www.ubuntu.com/usn/USN-1616-1 - (UBUNTU) http://www.ubuntu.com/usn/USN-1616-1 - Third Party Advisory
References (UBUNTU) http://www.ubuntu.com/usn/USN-1615-1 - (UBUNTU) http://www.ubuntu.com/usn/USN-1615-1 - Third Party Advisory
References (MLIST) http://www.openwall.com/lists/oss-security/2012/04/25/4 - (MLIST) http://www.openwall.com/lists/oss-security/2012/04/25/4 - Mailing List, Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/51089 - (SECUNIA) http://secunia.com/advisories/51089 - Third Party Advisory
References (MISC) http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=670389 - (MISC) http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=670389 - Third Party Advisory
References (MLIST) http://www.openwall.com/lists/oss-security/2012/04/25/2 - (MLIST) http://www.openwall.com/lists/oss-security/2012/04/25/2 - Mailing List, Third Party Advisory
CPE cpe:2.3:a:python:python:3.2.2150:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.3:beta2:*:*:*:*:*:*
cpe:2.3:a:python:python:3.1.2:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.1.5:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.2.3:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.1:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.3:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.2:alpha:*:*:*:*:*:*
cpe:2.3:a:python:python:3.1.1:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
First Time Canonical
Debian debian Linux
Debian
Canonical ubuntu Linux

Information

Published : 2012-08-14 22:55

Updated : 2023-12-10 11:16


NVD link : CVE-2012-2135

Mitre link : CVE-2012-2135

CVE.ORG link : CVE-2012-2135


JSON object : View

Products Affected

python

  • python

canonical

  • ubuntu_linux

debian

  • debian_linux