exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 16575

Secunia Security Advisory 16575
Posted Aug 29, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Mandriva has issued an update for python. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, python
systems | linux, mandriva
SHA-256 | 7c5a1c7ff77057154c1d9f5af76010519d235fb0860ca8fda0c63dc997bf5972

Secunia Security Advisory 16575

Change Mirror Download


----------------------------------------------------------------------

Bist Du interessiert an einem neuen Job in IT-Sicherheit?


Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT-
Sicherheit:
http://secunia.com/secunia_vacancies/

----------------------------------------------------------------------

TITLE:
Mandriva update for python

SECUNIA ADVISORY ID:
SA16575

VERIFY ADVISORY:
http://secunia.com/advisories/16575/

CRITICAL:
Moderately critical

IMPACT:
DoS, System access

WHERE:
>From remote

OPERATING SYSTEM:
Mandrake Corporate Server 2.x
http://secunia.com/product/1222/
Mandrakelinux 10.0
http://secunia.com/product/3918/
Mandrakelinux 10.1
http://secunia.com/product/4198/

DESCRIPTION:
Mandriva has issued an update for python. This fixes a vulnerability,
which potentially can be exploited by malicious people to compromise a
vulnerable system.

For more information:
SA16502

SOLUTION:
Apply updated packages.

Mandrakelinux 10.0

5254d6dd2c29d04b93742943d850d5a6
10.0/RPMS/libpython2.3-2.3.3-2.2.100mdk.i586.rpm
01e76259abbca381185552182c755ebc
10.0/RPMS/libpython2.3-devel-2.3.3-2.2.100mdk.i586.rpm
4c0842a0ae3c0d00af9f238aba27b2c6
10.0/RPMS/python-2.3.3-2.2.100mdk.i586.rpm
fb6a33cc69d04f8edd53ce8026fa1a11
10.0/RPMS/python-base-2.3.3-2.2.100mdk.i586.rpm
4775225e6c25405c162599ff27391d35
10.0/RPMS/python-docs-2.3.3-2.2.100mdk.i586.rpm
82530135e527cd8ac99193368a81c3fb
10.0/RPMS/xchat-python-2.0.7-6.1.100mdk.i586.rpm
917165c654a81f44cc974b0f6adeba35
10.0/RPMS/tkinter-2.3.3-2.2.100mdk.i586.rpm
06ab77bf8c3a95864d73018485f7a22a
10.0/SRPMS/python-2.3.3-2.2.100mdk.src.rpm

Mandrakelinux 10.0/AMD64

36deaedf901b5c30f68ba81aef492728
amd64/10.0/RPMS/lib64python2.3-2.3.3-2.2.100mdk.amd64.rpm
4be95cd1143d2f255b334b43e410e98b
amd64/10.0/RPMS/lib64python2.3-devel-2.3.3-2.2.100mdk.amd64.rpm
385fbba2bdf856e2acbb186a6977f6f0
amd64/10.0/RPMS/python-2.3.3-2.2.100mdk.amd64.rpm
bba1e1f45eaa5d557be977fdec1ef752
amd64/10.0/RPMS/python-base-2.3.3-2.2.100mdk.amd64.rpm
6f9b5d5076ba084325a108df2dd3523f
amd64/10.0/RPMS/python-docs-2.3.3-2.2.100mdk.amd64.rpm
0466472b41b2fd02802bfc5a3fe5b7a9
amd64/10.0/RPMS/tkinter-2.3.3-2.2.100mdk.amd64.rpm
06ab77bf8c3a95864d73018485f7a22a
amd64/10.0/SRPMS/python-2.3.3-2.2.100mdk.src.rpm

Mandrakelinux 10.1

0c2619eb2e9864ef420ec89ae78dba12
10.1/RPMS/libpython2.3-2.3.4-6.2.101mdk.i586.rpm
ed9f6fee4ec8ab8d8e2388f9c92f66ef
10.1/RPMS/libpython2.3-devel-2.3.4-6.2.101mdk.i586.rpm
e71c5ad5f0718e61c81a93c98667deaf
10.1/RPMS/python-2.3.4-6.2.101mdk.i586.rpm
4e8831f2dab035e3c67afc53f702108f
10.1/RPMS/python-base-2.3.4-6.2.101mdk.i586.rpm
7a4822ce3f46a48ead29363f23adfcd5
10.1/RPMS/python-docs-2.3.4-6.2.101mdk.i586.rpm
6b15b0c9b116db6b38623cb15f868fe6
10.1/RPMS/tkinter-2.3.4-6.2.101mdk.i586.rpm
b965827276d1efd49fc403dda0df33e8
10.1/SRPMS/python-2.3.4-6.2.101mdk.src.rpm

Mandrakelinux 10.1/X86_64

a19885472aaa03aad5c3dac1b8d668b4
x86_64/10.1/RPMS/lib64python2.3-2.3.4-6.2.101mdk.x86_64.rpm
79e3aaa88ec98d9007d20c37cee2cccd
x86_64/10.1/RPMS/lib64python2.3-devel-2.3.4-6.2.101mdk.x86_64.rpm
2a3eee71bcd5b63fa1cc39775e3d514d
x86_64/10.1/RPMS/python-2.3.4-6.2.101mdk.x86_64.rpm
318cec7614713c4410393ec50425bebb
x86_64/10.1/RPMS/python-base-2.3.4-6.2.101mdk.x86_64.rpm
494b1c0a96a211dacfd4f75f803014ae
x86_64/10.1/RPMS/python-docs-2.3.4-6.2.101mdk.x86_64.rpm
08bfe8c623d71cb66a5d84f5579eeac5
x86_64/10.1/RPMS/tkinter-2.3.4-6.2.101mdk.x86_64.rpm
b965827276d1efd49fc403dda0df33e8
x86_64/10.1/SRPMS/python-2.3.4-6.2.101mdk.src.rpm

Corporate Server 2.1

5a0c02b33df517b05732d15e52674218
corporate/2.1/RPMS/libpython2.2-2.2.1-14.6.C21mdk.i586.rpm
d4b45fdea45bcb3997cc33464411c0c5
corporate/2.1/RPMS/libpython2.2-devel-2.2.1-14.6.C21mdk.i586.rpm
dfcd6f26c5d4a2fa9863ff385db02add
corporate/2.1/RPMS/python-2.2.1-14.6.C21mdk.i586.rpm
b4f8157fd19d0d1a815dda9e46a51cbe
corporate/2.1/RPMS/python-base-2.2.1-14.6.C21mdk.i586.rpm
9ae1eabfc50a8e142e4f8c71a4942650
corporate/2.1/RPMS/python-docs-2.2.1-14.6.C21mdk.i586.rpm
fb5201c0f5a7d0c961699c8a11b678a8
corporate/2.1/RPMS/tkinter-2.2.1-14.6.C21mdk.i586.rpm
4278bc8a7bccc81af2e2a5d3f2ceef75
corporate/2.1/SRPMS/python-2.2.1-14.6.C21mdk.src.rpm

Corporate Server 2.1/X86_64

0637dd1d56b1325764fb76e7971cb8b8
x86_64/corporate/2.1/RPMS/libpython2.2-2.2.1-14.6.C21mdk.x86_64.rpm
4d58b57f2084fe45e8eb5f94165b1560
x86_64/corporate/2.1/RPMS/libpython2.2-devel-2.2.1-14.6.C21mdk.x86_64.rpm
efb6243e3d36f7efbb49d9aba35da8a7
x86_64/corporate/2.1/RPMS/python-2.2.1-14.6.C21mdk.x86_64.rpm
cf919649caf1ff241ad7b5bfe1723fcd
x86_64/corporate/2.1/RPMS/python-base-2.2.1-14.6.C21mdk.x86_64.rpm
349e2813c1646a5b912d15ba9b9a6f9e
x86_64/corporate/2.1/RPMS/python-docs-2.2.1-14.6.C21mdk.x86_64.rpm
87bb6b2752730ccc16d4f618a8b629e1
x86_64/corporate/2.1/RPMS/tkinter-2.2.1-14.6.C21mdk.x86_64.rpm
4278bc8a7bccc81af2e2a5d3f2ceef75
x86_64/corporate/2.1/SRPMS/python-2.2.1-14.6.C21mdk.src.rpm

ORIGINAL ADVISORY:
http://www.mandriva.com/security/advisories?name=MDKSA-2005:154

OTHER REFERENCES:
SA16502:
http://secunia.com/advisories/16502/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close