VRDA Feed by JPCERT/CC
  Vulnerability Response Decision Assistance Feed : Information for vulnerability impact analysis
[ about VRDA Feed | JPCERT/CC



 
Vulnerability Analysis Result (Revision No : 1) [ Download XML
CVE-2010-3493
python: Multiple race conditions in smtpd.py in the smtpd m...
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-3493

Original

Multiple race conditions in smtpd.py in the smtpd module in Python 2.6, 2.7, 3.1, and 3.2 alpha allow remote attackers to cause a denial of service (daemon outage) by establishing and then immediately closing a TCP connection, leading to the accept function having an unexpected return value of None, an unexpected value of None for the address, or an ECONNABORTED, EAGAIN, or EWOULDBLOCK error, or the getpeername function having an ENOTCONN error, a related issue to CVE-2010-3492.

Translation   (Show)





About This Analysis Information
Analysis Information Provider:
NIST NVD
First Published:
2010-10-19
Source Information Category:
Advisory, Alert
Last Updated:
2010-10-20




Affected Product Tags
cpe:/a:python:python:2.6
cpe:/a:python:python:2.7
cpe:/a:python:python:3.1
cpe:/a:python:python:3.2:alpha
 


Vulnerability Analysis Results
[Access Vector]  [?]
Undefined [?]

Local [?]
Adjacent Network [?]
X Network [?]

[Access Complexit]  [?]
Undefined [?]

High [?]
X Medium [?]
Low [?]

[Authentication]  [?]
Undefined [?]

Multiple [?]
Single [?]
X None [?]

[Confidentiality Impact]  [?]
Undefined [?]

X None [?]
Partial [?]
Complete [?]

[Integrity Impact]  [?]
Undefined [?]

X None [?]
Partial [?]
Complete [?]

[Availability Impact]  [?]
Undefined [?]

None [?]
X Partial [?]
Complete [?]

Alternatives




References
CONFIRM http://svn.python.org/view/python/branches/py3k/Lib/smtpd.py?r1=84289&r2=84288&pathrev=84289




CONFIRM http://bugs.python.org/issue9129




CONFIRM https://bugzilla.redhat.com/show_bug.cgi?id=632200




CONFIRM http://svn.python.org/view?view=rev&revision=84289




MISC http://bugs.python.org/issue6706




MISC https://bugs.launchpad.net/zodb/+bug/135108




MLIST [oss-security] 20100924 Re: CVE Request -- Python -- accept() implementation in async core is broken => more subcases




MLIST [oss-security] 20100922 Re: CVE Request -- Python -- accept() implementation in async core is broken => more subcases




MLIST [oss-security] 20100910 Re: CVE Request -- Python -- accept() implementation in async core is broken => more subcases




MLIST [oss-security] 20100909 CVE Request -- Python -- accept() implementation in async core is broken => more subcases




Vulnerability Type Race Conditions (CWE-362)





Copyright © 2010 JPCERT/CC All Rights Reserved.