Summary: | dev-lang/python CAN-2005-0089 (Vendor-Sec) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Sune Kloppenborg Jeppesen (RETIRED) <jaervosz> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED DUPLICATE | ||
Severity: | normal | ||
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | All | ||
Whiteboard: | A2? [upstream] / CLASSIFIED 20050203 | ||
Package list: | Runtime testing required: | --- |
Description
Sune Kloppenborg Jeppesen (RETIRED)
![]() 2.3.5 will be released soon to fix this problem. The exploit only works when register_instance() is called with an instance that does not implement _dispatch(). XML-RPC servers that use register_function() instead of register_instance() are not vulnerable. Unfortunately most XML-RPC tutorials use register_instance() without pointing out the recursive traversal feature. Embargo until 1600 UTC today. See advisory and patches @ http://www.python.org/security/PSF-2005-001/ |