vendor:
python
by:
@sha0coder
7,5
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: python
Affected Version From: python2.7 and python3
Affected Version To: python2.7 and python3
Patch Exists: YES
Related CWE: CVE-2014-1912
CPE: a:python:python:2.7
Metasploit:
https://www.rapid7.com/db/vulnerabilities/linuxrpm-ELSA-2014-1912/, https://www.rapid7.com/db/vulnerabilities/amazon-linux-ami-alas-2014-292/, https://www.rapid7.com/db/vulnerabilities/apple-osx-python-cve-2014-1912/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2015-1330/, https://www.rapid7.com/db/vulnerabilities/freebsd-vid-8e5e6d42-a0fa-11e3-b09a-080027f2d077/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2014-1912/, https://www.rapid7.com/db/vulnerabilities/alpine-linux-cve-2014-1912/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2014-1912/, https://www.rapid7.com/db/vulnerabilities/oracle-solaris-cve-2014-1912/, https://www.rapid7.com/db/vulnerabilities/amazon-linux-ami-alas-2014-293/, https://www.rapid7.com/db/vulnerabilities/apple-osx-apache-cve-2014-1912/
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: linux 32bit + python2.7
2014
python socket.recvfrom_into() remote buffer overflow
socket.recvfrom_into() remote buffer overflow Proof of concept by @sha0coder. The exploit uses a buffer overflow to gain control of the ebx register, which is then used to gain control of the eax register. The eax register is then used to call an indirect function, which is used to execute the shellcode. The shellcode is used to connect to a reverse shell on a specified IP and port.
Mitigation:
The best way to mitigate this vulnerability is to ensure that all input is properly validated and sanitized.