Vulnerability Details : CVE-2004-0150
Buffer overflow in the getaddrinfo function in Python 2.2 before 2.2.2, when IPv6 support is disabled, allows remote attackers to execute arbitrary code via an IPv6 address that is obtained using DNS.
Vulnerability category: OverflowExecute code
Products affected by CVE-2004-0150
- cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2004-0150
6.83%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 93 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2004-0150
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2004-0150
-
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.Assigned by: nvd@nist.gov (Primary)
References for CVE-2004-0150
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/15409
VDB Entry
-
http://www.gentoo.org/security/en/glsa/glsa-200409-03.xml
Third Party Advisory
-
http://www.mandrakesoft.com/security/advisories?name=MDKSA-2004:019
Broken Link
-
http://www.debian.org/security/2004/dsa-458
Patch;Vendor Advisory
-
http://www.securityfocus.com/bid/9836
Patch;Third Party Advisory;VDB Entry;Vendor Advisory
Jump to